0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) accept(r0, &(0x7f0000000080)=@llc, &(0x7f0000000100)=0x80) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x41, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) 16:01:34 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x141a00, 0x0) 16:01:34 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x0, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:34 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) sendfile(r1, r1, &(0x7f0000000080), 0x9) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) finit_module(r0, &(0x7f00000000c0)='&#\x00', 0x0) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x1, 0x0) ioctl$NBD_DO_IT(r3, 0xab03) setsockopt$inet6_MRT6_ADD_MIF(r3, 0x29, 0xca, &(0x7f0000000040)={0x9, 0x1, 0xffffffffffffff11, 0x3, 0x4}, 0xc) r4 = syz_open_procfs(0x0, &(0x7f0000000240)='personality\x00') setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r4, 0x84, 0x20, &(0x7f0000000000)=0x80000000, 0x4) sendfile(r1, r4, 0x0, 0x800000bf) 16:01:34 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x141a00, 0x0) 16:01:34 executing program 0: syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x80, 0x400800) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') recvfrom(r2, &(0x7f0000000000)=""/35, 0x23, 0x40000000, 0x0, 0x0) sendfile(r0, r2, 0x0, 0x800000bf) lsetxattr$security_smack_transmute(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000100)='TRUE', 0x4, 0x3) 16:01:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', 0x0, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:34 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x0, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:01:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) accept(r0, &(0x7f0000000080)=@llc, &(0x7f0000000100)=0x80) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200000, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x0, &(0x7f0000000040)=0x41, 0x4) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) 16:01:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', 0x0, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:35 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x0, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:35 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, 0x0) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x141a00, 0x0) 16:01:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc047, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x80) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000001340)="3f72849b52b67cb65d15bdebb0b5433801e70d64142e5eadb39d68c6efeef13f0b0b578efd4401167cbd1fe9f217db2dc1c97e1637bff59fd6d0eb4584b9890eded0ad05076316f3cf1f0aef51dac9e44f7f9b8d766a706bedf85413365b202e4d93d8b5368957250df78d0f618492b9d2dd4a9e0d00c143bb6c69f3b1573518") bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000013c0), &(0x7f0000001400)=0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001540)={'hwsim0\x00', 0x0}) connect(r0, &(0x7f0000001740)=@can={0x1d, r3}, 0xffffffffffffff79) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0xc) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendmsg$inet(r1, &(0x7f0000001300)={&(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f00000000c0)="771c76ee0efd32d08398b90bdd73175f623472eea21a45b9857370dee7157292bde0fe5cb4e2285a4289e9839f5e74ce8f608bcfe771361018ab2f822babfa1bf56cc57959901ed76e03a5e123a7", 0x4e}, {&(0x7f0000000140)="fdaf84b97e3b206166abde8815b35dc1efca8467264c017a8122c4c8793eefddee62abea8af3330c7b8e1f9fcbeb89eb2b8698a35480bffc50ac2e7ce61275c8d695a9d4d933fe00c51b0d4d5018301758c74cc84a55329ecd990908729bf38bd065", 0x62}, {&(0x7f00000001c0)="80c7a1ec294c64ebb9ec449d753a6cc8fc9cb67522aa11f21907fcd4808fd7de2735f8a110122dc46a52a40437439b77f87122757f8e615a023d8a00083644180831c064ae5c081bb398c6a579909998b417c06fcdb323d597ff094b67c9", 0x5e}], 0x5}, 0x80) sendfile(r0, r4, 0x0, 0x800000bf) write$P9_RWRITE(r2, &(0x7f0000001440)={0xb, 0x77, 0x1, 0x5}, 0xb) 16:01:35 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x141a00, 0x0) 16:01:35 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000040)={0x6, 0x0, 0x300f, 0x100, 0x5, 0x2, 0x9, 0x1}) bind$unix(r1, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000000c0)={0x53, 0xee5, 0x8, {0x3, 0x401}, {0x8000, 0x1}, @cond=[{0x2, 0xfffffffffffffff7, 0x7fffffff, 0xef, 0x7, 0x8}, {0x100, 0x8e1, 0x4, 0x5, 0x5, 0xa13}]}) read$FUSE(r3, &(0x7f0000000300), 0x1000) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x63) 16:01:35 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:35 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x141a00, 0x0) 16:01:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) read(r0, &(0x7f0000009f9c)=""/100, 0x64) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r3, 0x0, 0x800000bf) 16:01:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:35 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) openat$cachefiles(0xffffffffffffff9c, 0x0, 0x141a00, 0x0) 16:01:35 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, 0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc047, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x80) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000001340)="3f72849b52b67cb65d15bdebb0b5433801e70d64142e5eadb39d68c6efeef13f0b0b578efd4401167cbd1fe9f217db2dc1c97e1637bff59fd6d0eb4584b9890eded0ad05076316f3cf1f0aef51dac9e44f7f9b8d766a706bedf85413365b202e4d93d8b5368957250df78d0f618492b9d2dd4a9e0d00c143bb6c69f3b1573518") bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000013c0), &(0x7f0000001400)=0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001540)={'hwsim0\x00', 0x0}) connect(r0, &(0x7f0000001740)=@can={0x1d, r3}, 0xffffffffffffff79) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0xc) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendmsg$inet(r1, &(0x7f0000001300)={&(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f00000000c0)="771c76ee0efd32d08398b90bdd73175f623472eea21a45b9857370dee7157292bde0fe5cb4e2285a4289e9839f5e74ce8f608bcfe771361018ab2f822babfa1bf56cc57959901ed76e03a5e123a7", 0x4e}, {&(0x7f0000000140)="fdaf84b97e3b206166abde8815b35dc1efca8467264c017a8122c4c8793eefddee62abea8af3330c7b8e1f9fcbeb89eb2b8698a35480bffc50ac2e7ce61275c8d695a9d4d933fe00c51b0d4d5018301758c74cc84a55329ecd990908729bf38bd065", 0x62}, {&(0x7f00000001c0)="80c7a1ec294c64ebb9ec449d753a6cc8fc9cb67522aa11f21907fcd4808fd7de2735f8a110122dc46a52a40437439b77f87122757f8e615a023d8a00083644180831c064ae5c081bb398c6a579909998b417c06fcdb323d597ff094b67c9", 0x5e}], 0x5}, 0x80) sendfile(r0, r4, 0x0, 0x800000bf) write$P9_RWRITE(r2, &(0x7f0000001440)={0xb, 0x77, 0x1, 0x5}, 0xb) 16:01:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000040)={0x6, 0x0, 0x300f, 0x100, 0x5, 0x2, 0x9, 0x1}) bind$unix(r1, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000000c0)={0x53, 0xee5, 0x8, {0x3, 0x401}, {0x8000, 0x1}, @cond=[{0x2, 0xfffffffffffffff7, 0x7fffffff, 0xef, 0x7, 0x8}, {0x100, 0x8e1, 0x4, 0x5, 0x5, 0xa13}]}) read$FUSE(r3, &(0x7f0000000300), 0x1000) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x63) 16:01:36 executing program 2: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x0, 0x0) 16:01:36 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_FRAME_SIZE(r2, 0xc040564a, &(0x7f0000000040)={0x6, 0x0, 0x300f, 0x100, 0x5, 0x2, 0x9, 0x1}) bind$unix(r1, &(0x7f0000003000)=@file={0x0, './file0\x00'}, 0x6e) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x10000, 0x0) ioctl$EVIOCSFF(r3, 0x40304580, &(0x7f00000000c0)={0x53, 0xee5, 0x8, {0x3, 0x401}, {0x8000, 0x1}, @cond=[{0x2, 0xfffffffffffffff7, 0x7fffffff, 0xef, 0x7, 0x8}, {0x100, 0x8e1, 0x4, 0x5, 0x5, 0xa13}]}) read$FUSE(r3, &(0x7f0000000300), 0x1000) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x63) 16:01:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc047, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x10001, 0x80) ioctl$LOOP_SET_CAPACITY(r2, 0x4c07) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000001340)="3f72849b52b67cb65d15bdebb0b5433801e70d64142e5eadb39d68c6efeef13f0b0b578efd4401167cbd1fe9f217db2dc1c97e1637bff59fd6d0eb4584b9890eded0ad05076316f3cf1f0aef51dac9e44f7f9b8d766a706bedf85413365b202e4d93d8b5368957250df78d0f618492b9d2dd4a9e0d00c143bb6c69f3b1573518") bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) getsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f00000013c0), &(0x7f0000001400)=0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000001540)={'hwsim0\x00', 0x0}) connect(r0, &(0x7f0000001740)=@can={0x1d, r3}, 0xffffffffffffff79) bpf$PROG_LOAD(0x5, &(0x7f000000d000)={0x13, 0x3, &(0x7f0000008000)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x4c, 0x7}}, &(0x7f0000014ff5)='syzka\x00\x00\x00\x05\x00\xf3', 0x2, 0x1000, &(0x7f0000014000)=""/4096}, 0x48) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r2, 0x84, 0x16, &(0x7f0000001580)=ANY=[@ANYBLOB="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"], 0xc) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendmsg$inet(r1, &(0x7f0000001300)={&(0x7f0000000040)={0x2, 0x4e20, @multicast2}, 0x10, &(0x7f0000000240)=[{&(0x7f0000000080)}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f00000000c0)="771c76ee0efd32d08398b90bdd73175f623472eea21a45b9857370dee7157292bde0fe5cb4e2285a4289e9839f5e74ce8f608bcfe771361018ab2f822babfa1bf56cc57959901ed76e03a5e123a7", 0x4e}, {&(0x7f0000000140)="fdaf84b97e3b206166abde8815b35dc1efca8467264c017a8122c4c8793eefddee62abea8af3330c7b8e1f9fcbeb89eb2b8698a35480bffc50ac2e7ce61275c8d695a9d4d933fe00c51b0d4d5018301758c74cc84a55329ecd990908729bf38bd065", 0x62}, {&(0x7f00000001c0)="80c7a1ec294c64ebb9ec449d753a6cc8fc9cb67522aa11f21907fcd4808fd7de2735f8a110122dc46a52a40437439b77f87122757f8e615a023d8a00083644180831c064ae5c081bb398c6a579909998b417c06fcdb323d597ff094b67c9", 0x5e}], 0x5}, 0x80) sendfile(r0, r4, 0x0, 0x800000bf) write$P9_RWRITE(r2, &(0x7f0000001440)={0xb, 0x77, 0x1, 0x5}, 0xb) 16:01:36 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:01:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x101000, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000040)={{{@in6=@ipv4={[], [], @empty}, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@local}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@dev={0xfe, 0x80, [], 0x19}, @mcast2, @loopback, 0x1ff, 0x4, 0x0, 0x100, 0x6aee, 0x200000, r2}) r3 = socket$unix(0x1, 0x1, 0x0) bind$unix(r3, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r3, 0x0) ioctl$TIOCGRS485(r1, 0x542e, &(0x7f0000000240)) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000200)={@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2, 0x1, 0x4, [@loopback, @local, @remote, @empty]}, 0x20) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') socket$inet_tcp(0x2, 0x1, 0x0) sendfile(r0, r4, 0x0, 0x800000bf) getsockopt$sock_int(r1, 0x1, 0x0, &(0x7f0000000280), &(0x7f0000000300)=0x4) 16:01:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000380)={0xaa, 0x74}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000ffa000/0x4000)=nil, 0x4000}, 0x1}) mremap(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffc000/0x2000)=nil) read(r0, &(0x7f0000009f9c)=""/100, 0x64) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r3, 0x0, 0x800000bf) 16:01:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:37 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) r1 = openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[r1], 0x1) 16:01:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r2 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r3 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r3, r0, 0x0, 0x4000800000bd) 16:01:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:01:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:37 executing program 2: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, 0x0) 16:01:37 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) io_uring_setup(0x68, &(0x7f0000000080)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r0], 0x1) 16:01:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000804, &(0x7f0000000000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) shutdown(r0, 0x400000000000001) [ 1798.746961][T13724] binder: 13712:13724 ioctl c028660f 0 returned -22 16:01:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fd, 0x4) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], 0x273) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000005ee4458d40e7a2cf3b6ecdcbad900000000000000000000000000000000000000000000000000000000000000000007d665f0422b1aa00f788227554cc2f3cc5265d2b07ec15a324387282ba85a1b55ae9cf226e0aee89354bf98dd82e8e83860fe317b56df97a788f3fc8c27986a003fd44566c4833bbe642160d225fa8ef2b4b"], 0x8002) 16:01:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f00000002c0)={0x24, 0x0, &(0x7f0000000100)=[@increfs_done, @clear_death], 0x0, 0x0, &(0x7f00000001c0)}) 16:01:37 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) io_uring_setup(0x68, &(0x7f0000000080)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r0], 0x1) 16:01:37 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = syz_open_dev$binder(&(0x7f0000000380)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r1, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000440)={0x10, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='\x00c@@\x00\x00\x00\x00', @ANYPTR=&(0x7f0000000040)=ANY=[]], 0x0, 0x0, 0x0}) 16:01:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:01:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:38 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) io_uring_setup(0x68, &(0x7f0000000080)) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000000)=[r0], 0x1) 16:01:38 executing program 2: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r2, &(0x7f0000000280)={0x1}, 0x1029d) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000200)={0x0, r2}) 16:01:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f00000000c0)='/dev/loop#\x00', 0x0, 0x182) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81805) ioctl$void(0xffffffffffffffff, 0x5451) sendfile(r0, r0, 0x0, 0x2000005) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) 16:01:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:38 executing program 3: r0 = syz_open_dev$binder(&(0x7f0000000080)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x4c, 0x0, &(0x7f0000000200)=[@reply_sg={0x40486312, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f0000000300)="75194420"}) 16:01:38 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000001280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe6}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f00000001c0)=0x1fd, 0x4) write$binfmt_elf64(r1, &(0x7f0000000040)=ANY=[@ANYRES64], 0x325) write$binfmt_elf64(r1, &(0x7f0000000000)=ANY=[@ANYRESHEX=0x0], 0x273) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="7f454c4600000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000003800000000000000000000000000000000000000000000000000000000000000005ee4458d40e7a2cf3b6ecdcbad900000000000000000000000000000000000000000000000000000000000000000007d665f0422b1aa00f788227554cc2f3cc5265d2b07ec15a324387282ba85a1b55ae9cf226e0aee89354bf98dd82e8e83860fe317b56df97a788f3fc8c27986a003fd44566c4833bbe642160d225fa8ef2b4b"], 0x8002) 16:01:38 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 16:01:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) 16:01:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:38 executing program 0: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[], 0x73749ba9) 16:01:38 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = creat(&(0x7f0000000340)='./file0\x00', 0x0) write$cgroup_type(r1, &(0x7f0000000240)='threaded\x00', 0xf96d) fallocate(r1, 0x0, 0x0, 0x8001) fallocate(r1, 0x0, 0x0, 0xfff3) 16:01:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:38 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 16:01:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:01:38 executing program 2: r0 = inotify_init1(0x0) r1 = getpid() fcntl$setown(r0, 0x8, r1) fcntl$getownex(r0, 0x10, &(0x7f0000000100)) 16:01:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:39 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, 0x0, 0x0) 16:01:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4068aea3, &(0x7f0000000080)={0x7b}) 16:01:39 executing program 0: r0 = creat(&(0x7f0000000400)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write$P9_RREMOVE(r1, &(0x7f0000000000)={0xfffffffffffffe44}, 0xfffffe64) lseek(r0, 0x0, 0x4) fsetxattr$trusted_overlay_redirect(r0, &(0x7f0000000340)='trusted.overlay.redirect\x00', 0x0, 0x0, 0x0) 16:01:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:39 executing program 2: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) ppoll(&(0x7f0000000140)=[{r0}], 0x1, 0x0, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000040)=ANY=[], 0x73749ba9) 16:01:39 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000), 0x0) 16:01:39 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x8942, &(0x7f00000000c0)={'bond0\x00\x16@\xea\xff\xff\x80\x00\x00\x02\xff', @ifru_names='bond_slave_1\x00'}) 16:01:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', 0x0) r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:39 executing program 3: r0 = socket(0x1e, 0x1, 0x0) sendmsg(r0, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r0, 0x0, 0x0) 16:01:39 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000), 0x0) 16:01:39 executing program 1: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x800005, 0x0, 0x0, 0x0, 0x0, 0x1, 0x88400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000300)={0x400000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) setxattr$security_selinux(0x0, &(0x7f00000000c0)='security.selinux\x00', &(0x7f0000000100)='system_u:object_r:console_device_t:s0\x00', 0x26, 0x2) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0xffffffffffffffff, 0x802) write(r3, &(0x7f00000001c0), 0x10000026f) read(r2, &(0x7f0000000200)=""/250, 0x50c7e3e3) socket$inet6_tcp(0xa, 0x1, 0x0) 16:01:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(0x0, 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:01:39 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r1, 0x402c5828, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x9}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) fsetxattr$trusted_overlay_origin(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) 16:01:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(0x0, 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:40 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x36d, &(0x7f0000000000)={&(0x7f0000000040)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) 16:01:40 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000), 0x0) 16:01:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0xffffffffffffffde, 0x29, 0x0, 0xffffffffffffff31) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:01:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(0x0, 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:40 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) [ 1801.509345][T14850] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 16:01:40 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0x10000007c) write$evdev(r0, 0x0, 0x0) 16:01:40 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = socket$inet6_sctp(0xa, 0x2000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r3 = accept(r0, 0x0, 0x0) shutdown(r3, 0x2) 16:01:40 executing program 1: r0 = socket(0x1e, 0x1, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r0, 0x10f, 0x84, &(0x7f0000001240), &(0x7f0000001280)=0x4) 16:01:40 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$sndctrl(0x0, 0x0, 0x0) 16:01:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:40 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) 16:01:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:40 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000240)={0x0, 0x0, 0x0, 'queue0\x00'}) 16:01:40 executing program 4: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f0000000140)) r0 = io_uring_setup(0x68, &(0x7f0000000080)) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000000)=[0xffffffffffffffff], 0x1) 16:01:41 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x3, &(0x7f0000000000)) 16:01:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x800) r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x0, 0x4, 0xfffffffffffffffa}) ftruncate(r0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 16:01:42 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000000200)={0x8, "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", 0x1000}, 0x1006) 16:01:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x80044518, &(0x7f0000000100)=""/232) 16:01:42 executing program 0: r0 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0x40, 0x0) ioctl$VIDIOC_QUERYCAP(r0, 0x80685600, &(0x7f0000000180)) 16:01:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet(0xffffffffffffff9c, 0x0, 0x0, 0x800) r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000100)={0x0, 0x4, 0xfffffffffffffffa}) ftruncate(r0, 0x0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 16:01:42 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000002c40)={0x4}) epoll_pwait(r2, &(0x7f0000000040)=[{}], 0x346, 0xfffffffffffffff7, 0x0, 0xfffffffffffffe0d) 16:01:42 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(des3_ede)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000000c0)="ad56b6c5820fae9d6dcd3292ea54c7beef915d564c90c200", 0x18) sendto$unix(r1, &(0x7f0000000100), 0x14ded905162a6c92, 0x0, 0x0, 0xfffffffffffffec6) recvfrom(r1, &(0x7f0000001240)=""/4096, 0x1000, 0x0, 0x0, 0x0) 16:01:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mlockall(0x1) 16:01:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r1, r0, 0x0, 0x4000800000bd) 16:01:43 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9107}) 16:01:43 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) write$FUSE_NOTIFY_POLL(0xffffffffffffffff, &(0x7f0000000240)={0x18, 0x1, 0x0, {0xffffffffffffffdb}}, 0x18) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f0000000380)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000fd], 0x1f004}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:01:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r1, r0, 0x0, 0x4000800000bd) 16:01:43 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000000200)={0x8, "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", 0x1000}, 0x1006) 16:01:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, 0x0) 16:01:43 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)="390000001000030468fe0704000000000000ff3f06000081450001070000001419001a0015000200050008000500000800005d14a4e91ee438", 0x39}], 0x1) 16:01:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r1 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r1, r0, 0x0, 0x4000800000bd) 16:01:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 16:01:43 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) socket$vsock_stream(0x28, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rfkill\x00', 0x0, 0x0) getresuid(&(0x7f0000000280), 0x0, &(0x7f0000000300)) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000340)={{{@in=@loopback, @in=@dev}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, 0x0) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) syz_open_dev$sndctrl(&(0x7f0000000700)='/dev/snd/controlC#\x00', 0x7, 0x0) [ 1804.709570][T15687] netlink: 9 bytes leftover after parsing attributes in process `syz-executor.1'. 16:01:43 executing program 2: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$UHID_INPUT(r0, &(0x7f0000000200)={0x8, "7ed0e66b40731b7f08014fb2a4df986b66ab9eb15e466c62c75f5af8aa7dfaef86297d1707311d0d8054aec93bb4561e8c684e86e166ca5ff5e7639cf662b6d620b5249d36b9dd4db28bee29dc672f478a01215a8a575a00a8da653b68950f5ecbc960a57c1a79bf1181aadab04e5e9c923f31cd7a2adcbd1edb47fa7ef1882b6ffbac06f66a2bbfe65f7827f4b2c5269eb843de0986e8814531cac761d9cfec5ad4e09f38ed4bc3608470a495592426691e1d4bc75ecd21d5554e0b6ccdac6a10a27ee368877e2cbef90ef824361b8a4341a50fce5d5184462838e3c8f97037f896988cea238fbde30fadc835d392e22d9e1fb93e2acaad0b4822d8d2885456d04f29c9776bab8d891e772afc4ced714e2e4a34e7c0d700266de6e304f9bbfb8d5d3ad6f2c75023b1d40193f709de0a33b0a9f9fe6226e5269c9d13c0616fcaf2aca4cd2311f815bfe9f2750b6061a4b2f7f323273a608372911ebc3d7e201cc0d278c858d420f1608a89b17940043fedfad7de2763edb8684e6b7aaafe9ce5eda0239db9d0b0a1eca5b616033685c9f35dea5a17e67214adb73dd627872c821077968255a8b24779846c11a1904f9badf9d808458fc58051705e2f91fe63dddd6ca1f4e0abab462e13b6a05bf3d16678a784193e3eb5530d26e5dd7e275fb7c3c28f324423f1d08d9067724c3cd8997c65f09fc78ca1f5a9f992e32bdaf3970ad7f03bff2c224237e83aa9a1dfa6aa80aa88a6c180d03f278d50c6886f6a50741e2c64a612e9485c6f3489d3f289b25f4681b485dfa04e1be653a446adc1fdd22bb8efda6718d13175884591bb3d5f2b98ba410375b0d09b3078407232f5e0749962339742ba6884c244c39cd6e986c75f84d70fc437e750ba83332f742f8a686b12de1045706e0c1617a62f001c294d3b260404842fa5885041ac78ba0ca67f17fb2113f43324a09ce0193e57ceb78332d120daafa85b22debfd4a6b1ee1a640d9e5423be4fd701fb4a0e7eef9bf51c0f3a1b1fbc69ca22760d3591e31e416125ae7b836afd9bb2864eda90444efd6f06a198b82ca436025757c94c1c28326d5c04298d134f017a199d273d4f015db52823b899cd4df79886f3a6764e4ab64cfe8ef02e3fac8e38358575fda3faad91192efbc2f89730719552fc83442a8249f7d26cd7149d835ec8af8978d890ef9cf2e5f71aa414231a534e5acde5110eae556231adae0339ee125a748d5fa4430ebfcd4af46f43e1d56ba648bd57d277e30235769e5fe8e9bc514d7b3d0d7e623b12651141372a960aa92ad8089fca0fd5f1084916fd9aef8f7ac54d0dda5ebe9d723b225b7478a6b6bf581e985e748e89fcfa2af5faa009e5ac903814abf0db153becc5b81176b7266c75f50c1ad4889640adf3ebcf5d556fd88d116b17ad129f4c80c562f67fab53f05d7561bdc65f750589f6406b741eba6e68f9599cb7d62c46654ab95393a071d8482e25a02cdfc9571d036345137c0a4f264f9948b4c35ed118cd2ee393bab41e13039c5c5abe6f214c721eb3c825c0d9079f395bdda6e83a979af87909467df0acda646b709bc78c2de5233ce74c0c54fcef3a749092b837fb23b17ded2ac63fd9e3e4f7b018623b24745dddb7a0500af4793a470931bd65b6bb563fad04cf0ff69429fe0b518ef4013f7859085b0c93efbb9345fef6a88f330cbfc6ce351f07bb378003bad35800a6d36516dcfd68fa82f4f482e53cee0ed309ee2ce1f1c469dfc0ad44355847281afd0b288083ce3d12a5f6294322c3bc44b1781b74e6a6b08506cb77bd2d2a9a6e93ba961b1f47330a9bcd30744a91472663a5e9c697fd7a430faa48b61ce4ca9b8909082b949bbce7c61ec09649ef03723cc0cd0f35f21884b833b88916e90c4d9c382b7f454103f8a448eb59cac510b9059ec3eacb7c18a254bb618e4b03ec6324ad477b835f1a17e92966c826c3ea44c7b271347fd2fffa733d852adc90472729635e0c26604cb4d686dfa542329037e66df50d2935a20777be64ca532990d18ecff4c20ccd7e996e6db9eea74373eb1ce48d7d22ae5aeebda1a553ad4b0bc1e1bac200bd487a7b48972447c992264a9a42a9f7b2680f42404cc6f9c93e24857268d7159e4212e41ccd2ba7716aac395b3435bf8a2df8151b44c1381914cc065aaf120a04616bfe92e02a365b9f65bcca08323dd1dfa052a2f942bffe468c711c5e46f2ac438db358ba9b24cc58d190539b80c0510011b1f3e1f2482c899cf75e0b1d237e0e8029f0cfe0ca296269d2b092b7d7d3369e785a620e4aced04f07fa7113e2a53ae512fcf07338ba9169371c7840e7ec5ca8493c8a5645927de0eea80cc6ee3fcef94e94bbf14888aea814550df619c14474505132e19d15637f03559a351ace023d4140d29b0bb28dc02ac907d93a3ffc7958fddadd54b63470580f58cbda8976ab49283131370ce4462f735ea7ecc7fc215d603f473da904b69aa777fa4947bd5d897d8855f8b72ef4dfdcb116dbe4ae38a60d1bd97c35656cebb2b43d91cb1e1db4a96042b7e1a947d8c5217d482a0b1ca37e969afd8f5b463922e0e530a6cb62944724df7ead0d1a9660483f37b616234e609cf0f46bf473cf9b7c1b038f8f13b6a71d25150be9ce4e70798004c92f9386f5688d0df4c3d1fd8c47add71e06403a468ad659db15f7b2ace437aadf1f7df4bd44a7901d842cf24025a3d583a9436f67fc219f3496f01cae751bfce15753b1814c45083195fc444d818d3c5ac43d19983d8cac63261d84a219840196e7a591fda261e60f9ff1e5d811825d9a5a13638163a30317a178380b818d4aad88711e86ae5b0ec8540b7092d26bcd4d13b1f7e43fe48a703a3b9c079c85247feac4d447e252a921470082afd07423a86347a713c70a81c0a95188d040325f40260cda564fb4ef03ec6a289288213a90a487643ba3dd638fb5a6e07bcbd79798b50da2e00d1ea8bdd1928cfe375ede7ac8fa401b8b43615e182dce03d13ba63187a52efb68553e29d7f029fd83838465342d26661f9fe9ad5a809b05bf847eb6be59e234884ad59f68871310f3d7e4ee6dd2d6ae586973e8ee157f8dc0e5f5d5955a37515a454e29d08e4e27cc98990a6181448062176e6a9a67acd704586072f93d977ba7875a7db22d18f5b5fb293b7cfaa18271da1b7778d60e5d18f96fb943a350eed8a93581f78f2144d16fcc19a6d706d978f6e4bd7169617e89eb2c12c163032ac5ddf9edef3e91363db75426bc2c04a7e2ed0537e172ca8a880bb41f22bb4481f11bc0b5310260e19b1abbd6ec6f340b8886c1d44a1bde873a75e837b102e8a483e08768454f4d5876151f54f53e8a2a3606d5d6b1b06e3e1513428cb26f085cf50879c7cb03e083416307c44e3c4e8f3d2036e871afb64a7acbad9081d8abbc011c2e44f493a27beaef2a4a1953a0071307f7e2bafee75c502b8dfa11bb32729f4cd4675bbdb1fba9c47484e94c0254766f5038f81efec7a7d061c89ee776ac0e700c313c97f4f484db7767b2338322520063707465dafc2d60db49b871b7e62901f7a0a46a173301ee7c18fcb30b4d0f77ddcc71143e9760cd50246c5759531f80287ab9b5b6e30bc546f04fdafc40b671401f0b74e0abbb3e4e3bcb4e2aa608c8fca429c64adb0de5a60e33863da824f533622e690de16ee6c744480af6e367964f16dfbaaeb0f308c2fce8a9e627890d51c2a4e257eade9a940a18ca856c7de0271dd7345f3fb339bca6d35983cf6676c8231854d320b5a1a32dd028929d442d2323529a423e6cb55c5217e6134e9965ace3ebd40f6e538288e058bc34ae25bbc4c97547fd1fba2ea556f451d7beb601abec952ac182374ff6fc2a17476ba9b5992828211c814b2b3696f5c44e964cf71d66b1d79db478039235c095680c6c27a0cbf88876cdd3124e491b8e20104f9ce9e6b624f8d719f6c31273330465925ea1ae5abf3c0a2ff9d7b1a5b0d8bb6a8debc3e2668cba3c6c383f2ee756a3c811eef34c236a95a7e579ca366dd09b812440747b372463d47c9fe9b2847415515a762bf14faedf503bff6d1b4ee46fd94b53c07f4139379c1f1a845fecd3ac0482fa4100361994a132c150361d71685a82170990a1bfe84a6758df6118da74eb272cfa2679366f3a71788f9d05341a2405016d3e31227cb354ec0e55ff8a962f21cef133392d858373d77e1fe2e66bb4fb927679e4851232fdba58c6fdadccc730c877f075ad02e53e13443878a7848ce09d0ad8de6c974df8bbb86ea18150b27b3c11fa545388a4a34dab88609d7b13640a5ac9dfe4c6f8610c60044e01bf5d230445a36720a19c8e7bad5e76887bd4e3969acd5987e3db91c276991c5de62b76bf275bd75a1196b3d3eb73b209a8a32c826358261f98f6832e323bee53fa9d79c5e4df926a255151959c9dbdd2848d2f26e73f2fe60eaca05f6cc575a103ef02c60d76352444fde210695f5b2d8a1e45a205b5e0e2d4d3ef6e8c9f61c47a31572740d0db7dcccef0768c659ec0ff691e895a63345aa45502b5c09a94e89bb1741be128ece115857550d5b73b2713a380e373d48b230b20177df048a54f644bdc1869aad923394cefa38eb149cc14438f53e1cbc49663a4896ce46dcb16ebb2af04f0a51a1dd84ca94bd39f82f01bb65e5e27e609c2a60a2d84a667bd0ec236d82d80a1c6ff9ef59eb801b1dc0cb7c009109a6f65e957f1928aa5c5a5e232306e0cbfbbe9dad20f1128b83ae7b3aade49dd71fff88cd31529e89380dbbe76d044f77aebcef4f3aa44cc49c05cfea297875f7b08d86a841c156409d0a12364e22fdd81a77b3a16088452051d9d300c91dbc6a87402f060b035223f51b5fff59b0d39ef29207689b94cbaa4f96ffc459f71cca278f43f52496dda2811dab41159df497baa1113abe05470d10f7e03c2e705349b2361237d359ffab0c18ae82c969ec1e3a9ed1fc53ee168b40dba0daae663e5a90a6ac26ea0a4ce04a68cbdb73b6f897a5b0233d1d51c1809e9a1e53bf1b31d4221c797d02d38b7a0d32918203c84509260148f461ae1aba3894e28c2bec84ea76527d9319bb0f67efe5fa9d3e88980010f1d68cf9604d6c31e6c2a6e12ce78e49e288028cbcbca975abb3865251b5bd7c55281307763d571f41e57d2dbdb9ec15acf95ed54b7a4d097c21b5cc69ccc03e22879061298c3c280581cf74879c9aada2e5f15a8cbfaeb227a845c8350032180ce148713842096f15b5ea2211d70911648b86c0ce77ff6924d6a99bf6456ab35e31990a4df0977e6e35e41407fc789ab9120c04c3fc13546b182f3c5ad12aad047a520604609590cee14067139a477c48bc2f3b5ad6e0715d1343e010da4b5848837905e163133a3678b26d6c5caedaeb5a789d38addb29ed23d96af0c95452f03dd1c467d0e6fdcfa3dbca020f7241d8420af5d97d2f348d8b2749fd731f981886026203f3ea8c7cb73ec633c6b4cc5a6810c5803e8448e3557dd1e16be1dffbb00cdd1169f69194ad6eec4844242e088f98b5dfb093c2e02e08daa085b4088596e8a8b0db856aca47adc65d7363c69cc806b989c3e8868628a4d6554388594b5016f27d08335d3d52562a660c2021a0ca229b0fc17a172b0d12ee619985c600a3c63b1d9313f5291ef01201edf5f84a06736a608e9da18094841701e006e05e6a729449e45ded277be14ce8b5686adc1a8565682865a0f0be4b013aa28cd973a157c3f705168771217d4b0ceb01ca9c3da81fe383f420d5778e4061f4174", 0x1000}, 0x1006) 16:01:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef898340fbf144c9ef3b3ede4dddce33debce9ea76756acde6ca290d70780452d7a38d3aea607cb345", 0x62, 0x400}], 0x0, 0x0) 16:01:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20ncci\x00', 0x200, 0x0) 16:01:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:43 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000400)) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0xffffffffffffffff, 0x2) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xb, 0x0, 0x0) ioctl$KDGKBTYPE(r1, 0x4b33, &(0x7f0000000240)) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x70, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x20) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000080)={'hsr0\x00\x00\x00\x01\x00'}) 16:01:43 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000280)=0x400100000001, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @loopback}, 0x1c) r2 = dup2(r1, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r2, 0x6, 0x16, &(0x7f0000000440), 0x132224) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$inet_int(r2, 0x0, 0x100000000000001, 0x0, &(0x7f0000000000)=0x1) fcntl$setstatus(r1, 0x4, 0x42801) clone(0x0, 0x0, 0x0, 0x0, 0x0) 16:01:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) [ 1805.437155][T15819] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 16:01:44 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = memfd_create(&(0x7f0000000100)='t\bnu\x00\x00\x00\x00\x00\x00\x00\x00\x00\x8c\x00', 0x0) fallocate(r1, 0x0, 0x10001, 0x6) lseek(r1, 0x0, 0x3) 16:01:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) [ 1805.553739][T15928] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1805.562481][T15928] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) [ 1805.692160][T15928] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1805.700358][T15928] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) [ 1805.845245][T15816] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 16:01:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000000140)="800000003804000019000300e60100006c000000000000000100000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef898340fbf144c9ef3b3ede4dddce33debce9ea76756acde6ca290d70780452d7a38d3aea607cb345", 0x62, 0x400}], 0x0, 0x0) 16:01:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:44 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:44 executing program 2: syz_mount_image$xfs(&(0x7f0000000200)='xfs\x00', &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)={[{@rtdev={'rtdev', 0x3d, './file0'}}]}) 16:01:44 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x10, 0x3, 0x0) write(r1, &(0x7f000018efdc)="2400000052001f0014f9f407000904000200071008000700fe0500ff08000100feffffff", 0x24) 16:01:44 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) [ 1806.141982][T16154] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1806.150458][T16154] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) 16:01:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) [ 1806.213564][T16165] XFS (loop2): Invalid device [./file0], error=-15 [ 1806.245798][T16163] EXT4-fs (loop3): couldn't mount as ext3 due to feature incompatibilities 16:01:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:45 executing program 3: r0 = socket$inet6(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000240), &(0x7f0000000280)=0xc) 16:01:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:45 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000240)=[@textreal={0x8, &(0x7f0000000080)="f2a6bad004b00fee0f090f3036f30f1a970000660f3806581e0f08bad004b0beeef30f2af8baa100b000ee", 0x2b}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000040)=0x96d1, 0x3) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$VIDIOC_G_TUNER(0xffffffffffffffff, 0xc054561d, &(0x7f0000000180)={0x0, "b6f71b6b3c1824a43da3b883b9d142bc393d8fe0cf9f3a9a261ee50021320b2e", 0x0, 0x224}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) accept4(0xffffffffffffffff, &(0x7f0000000580)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @dev}}, &(0x7f0000000000)=0x80, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f00000008c0)="a327ac4e455dcf9a25b3bfb6eeb778433d02bc9898438e475b57bd22f1d542f329da10a04b62c6689c716ae47de1754438c0094c55aae43e65489dc324eaccbbcb664e2c0c5180cbf3c7102b37dbee80fc2860b530de584725c334f93a724ca98d84cb6c0714382b431f2b468fdc279157e0fd40b3baa8b4239caa238d87f79d10d1cc4caa64c8608f01cd40697320c669973fadb52b43cd849d035b408da3a593392df54d096854da34c63f17ba0721dfc48bfef7c12d53e2ec43ce42792959baaab1e34cb1161f9577ce4d1ce4a5d1a2a6195444d07c71bd24ef58acc57b33127eb1119330d2cf63d89d31f241") ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x4ce]}) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 16:01:45 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000080)="11dca50d5e0bcfe47bf070") close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='ip6_vti0\x00 \x00', 0x10) connect$inet(r0, &(0x7f0000000200)={0x2, 0x0, @initdev}, 0x10) write$binfmt_elf32(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="4ef27f45294600000021086c0000000000000000014412050900000b00"/56], 0x3a) 16:01:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:45 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) [ 1806.637738][T16285] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1806.646063][T16285] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) 16:01:45 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fe, &(0x7f0000e68000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='veth1\x00\x00\x00\x00\xff\xff\xff\xff\xff\xef\x00', 0x10) r1 = dup2(r0, r0) sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) 16:01:45 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:45 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:45 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = socket(0x1e, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) sendmsg(r1, &(0x7f0000000000)={&(0x7f0000000080)=@generic={0x10000000001e, "02ff0100000001000000000000000ae77f5bf86c48020002000000f1ffffff009a480075e6a50000de010300000000e4ff064b3f013a000000080000008f00000000ac50d5fe32c4000000007fffffff6a008356edb9a6341c1fd45624281e00070ecddd0206c39750c40000fd00000900000000000b0000db000004da36"}, 0x80, 0x0}, 0x0) write$binfmt_elf32(r1, &(0x7f00000015c0)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYRES16]], 0xfffffd6d) recvfrom$inet(r1, &(0x7f0000000180)=""/4096, 0xc30, 0x0, 0x0, 0x0) 16:01:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x2, 0x0, {{}, 0x101d0}}, 0x10) [ 1807.002678][T16511] EXT4-fs (loop4): mounting ext2 file system using the ext4 subsystem [ 1807.011025][T16511] EXT4-fs (loop4): Unsupported filesystem blocksize 1048576 (10 log_block_size) 16:01:45 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:46 executing program 1: bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:46 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000180)=0x0) r2 = syz_open_procfs(r1, &(0x7f0000000100)='pagemap\x00') sendfile(r0, r2, &(0x7f0000000000)=0x100000, 0x100000008001) ioctl$SNDRV_TIMER_IOCTL_START(0xffffffffffffffff, 0x54a0) 16:01:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x803, 0xff) connect$inet(r0, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = open(&(0x7f0000000000)='./file0\x00', 0x141046, 0x0) ftruncate(r1, 0x10004) sendfile(r0, r1, 0x0, 0x72439a6b) 16:01:46 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000240)='/dev/uinput\x00', 0x0, 0x0) ioctl$UI_DEV_DESTROY(r0, 0x5502) 16:01:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:46 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:46 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, 0xffffffffffffffff) 16:01:46 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:46 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:47 executing program 3: 16:01:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:47 executing program 2: 16:01:47 executing program 3: 16:01:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:47 executing program 3: 16:01:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:47 executing program 2: 16:01:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x0, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:47 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', 0x0, 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) 16:01:47 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:47 executing program 2: 16:01:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(0x0, 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:47 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:47 executing program 2: 16:01:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:48 executing program 2: 16:01:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(0x0, 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) [ 1809.410653][T17219] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e95", 0x21) 16:01:48 executing program 2: 16:01:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:01:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(0x0, 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:48 executing program 2: [ 1809.802091][T17282] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:01:48 executing program 2: 16:01:48 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 16:01:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:48 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:48 executing program 2: 16:01:48 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) 16:01:49 executing program 0: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) [ 1810.261151][T17312] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:49 executing program 2: 16:01:49 executing program 0: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:01:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 16:01:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 16:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:49 executing program 2: 16:01:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 16:01:49 executing program 0: ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0x4000800000bd) [ 1810.646529][T17339] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 16:01:49 executing program 2: 16:01:49 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:49 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100), 0x0) 16:01:49 executing program 2: 16:01:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000800000bd) [ 1811.058265][T17366] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:49 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0) 16:01:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8", 0x11) 16:01:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:50 executing program 2: 16:01:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x4000800000bd) [ 1811.337541][T17387] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:50 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r0 = socket(0x1e, 0x5, 0x0) connect$tipc(r0, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:50 executing program 2: 16:01:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8", 0x11) 16:01:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 16:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000800000bd) 16:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8", 0x11) 16:01:50 executing program 2: [ 1811.660478][T17410] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:50 executing program 2: 16:01:50 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:50 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 16:01:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df9", 0x19) 16:01:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:50 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000800000bd) 16:01:50 executing program 2: 16:01:50 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df9", 0x19) 16:01:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1812.168492][T17443] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:51 executing program 2: 16:01:51 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r0 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4000800000bd) 16:01:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{0x0, 0x0, 0x400}], 0x0, 0x0) 16:01:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df9", 0x19) 16:01:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 16:01:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04", 0x1d) 16:01:51 executing program 2: [ 1812.520438][T17468] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 16:01:51 executing program 2: 16:01:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04", 0x1d) 16:01:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) [ 1812.880576][T17488] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:51 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, 0x0) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:51 executing program 2: 16:01:51 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04", 0x1d) 16:01:51 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 16:01:51 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 16:01:51 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:52 executing program 2: 16:01:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b", 0x1f) 16:01:52 executing program 5: 16:01:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1813.254339][T17520] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:52 executing program 2: 16:01:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0), 0x0, 0x400}], 0x0, 0x0) 16:01:52 executing program 5: 16:01:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b", 0x1f) 16:01:52 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000200)={@local, @dev, [], {@ipv6={0x86dd, {0x0, 0x6, "88dc4f", 0x10, 0x21, 0x0, @remote, @mcast2, {[], @dccp={{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "96e266", 0x0, "3db41b"}}}}}}}, 0x0) socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(0xffffffffffffffff, 0x111, 0x4, 0x0, 0x4) 16:01:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1813.684447][T17545] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:52 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0x8000000003e, &(0x7f0000000040)=0x7, 0x4) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) bind$llc(r0, &(0x7f00000002c0), 0x10) sendmmsg(r0, &(0x7f0000001380), 0x3fffffffffffeed, 0x0) 16:01:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b", 0x1f) 16:01:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)) r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) [ 1813.798684][T17555] net_ratelimit: 10 callbacks suppressed [ 1813.798738][T17555] dccp_invalid_packet: P.type (REQUEST) not Data || [Data]Ack, while P.X == 0 16:01:52 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001", 0x1d, 0x400}], 0x0, 0x0) 16:01:52 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e", 0x20) 16:01:52 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:52 executing program 2: sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000003780)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003680)=""/204, 0xcc, 0x88a8ffff}, 0x0) [ 1814.122750][T17673] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e", 0x20) 16:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) [ 1814.218107][T17683] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.2'. 16:01:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001", 0x1d, 0x400}], 0x0, 0x0) 16:01:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1814.486077][T17736] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:53 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x0, 0x300) perf_event_open(&(0x7f0000000400)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x7f, 0x2, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x5, 0x0, 0x0, 0x5, 0x81, 0xfffffffffffffffd, 0x0, 0x3, 0x0, 0x0, 0xdad, 0x1, 0x10000, 0xfff, 0x10001, 0x8001, 0xdf, 0x0, 0x5, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xabe7}, 0x0, 0x0, 0xffffffffffffffff, 0x1) gettid() socket$kcm(0x29, 0x5, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000005440)="2e000000120081aee4050cecdb4cb9040a485e510befccd77f3e9cf0758ef9000600b0eba06ac400040000000000", 0x2e}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000003780)={0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1, 0x0, 0x0, 0x88a8ffff}, 0x0) 16:01:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="69424c906d725614a204e185a8eaf41ba8f5b5766d8e640df92239ca04301b3e", 0x20) 16:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0b") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:53 executing program 2: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') 16:01:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001", 0x1d, 0x400}], 0x0, 0x0) 16:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:53 executing program 1: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8943, &(0x7f0000000680)='nr0\x01\x00\x00\xc3\x00') r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x1132}) r3 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r3) socket$kcm(0x2, 0x3, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000780)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x14\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xe0u\x12L\x9b\x1f\xf6P\rSj\x95\xd9o\x03\xd4\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') [ 1814.775029][T17811] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1814.845225][T17820] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 1814.860493][T17825] netlink: 2 bytes leftover after parsing attributes in process `syz-executor.5'. 16:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 16:01:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47b") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) [ 1815.078407][T17886] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:53 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 16:01:54 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x1001000004e23, 0x0, @loopback}, 0x1c) listen(r0, 0xfffffffffffffffe) r1 = socket$inet6_sctp(0xa, 0x2000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000300)='gre0\x00', 0x10) r2 = accept(r0, 0x0, 0x0) sendmmsg$alg(r2, &(0x7f0000007200)=[{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000100)="dff6a631e508c0fef713d3aac11b6bb9f938377986f11eca3ac77ccc306ba4aac72045efbc028330afb5778d480a38832bea2d268d332f1d4a47558aa4697da5", 0x40}, {&(0x7f0000000340)="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", 0x559}], 0x2}], 0x1, 0x0) 16:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:54 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1815.482394][T17960] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:54 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf0") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg$inet(r1, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="8c2fb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f680fcd8bd0da6e13b662424ccd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce37375165fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404", 0xbd}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0xc}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000500)="426a45705ec53350aaa74eef11d62035c8d21c2bcb1c26759f32b08d7978bc2e2ac03256030b3107f472fc36db0f536f42aae97ceef6169f4ebd79c8696b", 0x3e}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d406b98fe4e651768f6d10acced1cdd94142e8d6af3ec20a679b4cb6f97194ce7381825ba60b451754e457e8289fd373fa8bacd388f1a3049f8296d9eebc1", 0x92}, {&(0x7f0000000700)="7b7b2ae757d6f03b21cec15d2ab68113bf233de12088aa87f905155f6b8cf44e0a1be9db8ee7ab7675a036dbb09736dff58a416371d1ed28967b1062e09e623f54837106f762142784d4a188641208028c8f3612c174dc4af21e03ac78da7ee057af22c6763fe8f611abd37d66bd75e237d8158928a9d44f0769cb9585130f5356", 0x81}, {&(0x7f00000007c0)="1b256a67703d73e69ce6c980911e2a2fcf5243a939de66c01ca6c029d74ae8a427219cbc579220766149ee773107bdd9e66f1c05ca75a266", 0x38}], 0x3}}], 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 16:01:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000", 0x2c, 0x400}], 0x0, 0x0) 16:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:54 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x0, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) [ 1815.868996][T18091] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:54 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:54 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 16:01:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x3) sendmmsg$inet(r1, &(0x7f0000000b40)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000100)="8c2fb08f70aca1f2e24e7dc4636db1607852800ad7239bfbb123065f680fcd8bd0da6e13b662424ccd67943bc81a1d56defee801abbb295542689614ad3cf075062ecc8fff703998f05b4a75cd21c51a0cdf5c1d22ec6c88b2f328c35d2284ce37375165fc7b892d9211b9f2b8d60d65de6a11b376b8379dea0e24d9d54997f9b0c35fdbb691b6a85b1dd235877eaf2c6b56cdebc12feefdd198891969cc07ec80aa29bcc95a7fa0866e97a784c0ac21edab15d06cfb51b0f47e5f4404", 0xbd}, {&(0x7f0000000340)="4520d8c1ee8e08b9ee293229", 0xc}], 0x2}}, {{0x0, 0x0, &(0x7f00000002c0)=[{0x0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000980)=[{&(0x7f0000000640)="6704848d55e654ad6f06f85d5c8caed968361a080c9a53252ca10c8e9f2257b4300eccf6f7e8f49e10382d24c8e304851ba9f674097b80c63dc396090a3762753a1400aba6fc2b7dcec89c4c03bb4f4a995e7f0d406b98fe4e651768f6d10acced1cdd94142e8d6af3ec20a679b4cb6f97194ce7381825ba60b451754e457e8289fd373fa8bacd388f1a3049f8296d9eebc1", 0x92}, {&(0x7f0000000700)="7b7b2ae757d6f03b21cec15d2ab68113bf233de12088aa87f905155f6b8cf44e0a1be9db8ee7ab7675a036dbb09736dff58a416371d1ed28967b1062e09e623f54837106f762142784d4a188641208028c8f3612c174dc4af21e03ac78da7ee057af22c6763fe8f611abd37d66bd75e237", 0x71}], 0x2}}], 0x3, 0x0) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000600)=0xda9, 0x4) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(r1, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab4ea6f7ae55d88fecf9221a7511bf746bec66ba", 0xfe6a, 0x11, 0x0, 0x27) 16:01:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x0, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:55 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) [ 1816.238395][T18312] cgroup: fork rejected by pids controller in /syz3 [ 1816.250249][T18315] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:55 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 16:01:55 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x0, 0x5, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:55 executing program 1: ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl(r0, 0x4000001000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") syz_emit_ethernet(0x38a, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2ce, 0x0, 0x0, 0x0, 0x29, 0x0, @rand_addr, @multicast1}, @icmp=@address_reply={0x8}}}}}, &(0x7f0000000040)) [ 1816.655813][T18540] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:55 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe", 0x33, 0x400}], 0x0, 0x0) 16:01:55 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:55 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x0, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:55 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:55 executing program 2: 16:01:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1817.167635][T18772] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:56 executing program 1: r0 = syz_open_dev$sndseq(0x0, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x0, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 16:01:56 executing program 2: 16:01:56 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:56 executing program 1: syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x0, 0x0) connect$tipc(r1, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:56 executing program 2: [ 1817.533917][T18794] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:56 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 16:01:56 executing program 1: syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket(0x1e, 0x5, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:56 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) close(r0) 16:01:56 executing program 5: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:56 executing program 1: syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) [ 1817.867846][T18822] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket(0x1e, 0x5, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:56 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ff", 0x37, 0x400}], 0x0, 0x0) 16:01:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:56 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:56 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) 16:01:56 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") socket(0x1e, 0x5, 0x0) connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@name={0x1e, 0x3}, 0x10) 16:01:57 executing program 2: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000100)) 16:01:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:57 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) 16:01:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, 0x0, 0x0) [ 1818.295195][T18952] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x0, 0x0) 16:01:57 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, 0x0) 16:01:57 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, 0x0, 0x0) 16:01:57 executing program 2: r0 = syz_init_net_socket$rose(0xb, 0x5, 0x0) listen(r0, 0x0) clone(0x20000500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) accept(r0, 0x0, 0x0) 16:01:57 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) [ 1818.672466][T19075] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x0, 0x0) 16:01:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:57 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x200001000008912, &(0x7f0000000000)="11dca5055e0bcfe47bf070") r1 = socket(0x1e, 0x5, 0x0) connect$tipc(r1, 0x0, 0x0) 16:01:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:57 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:57 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1819.059984][T19107] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:57 executing program 0: 16:01:57 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53", 0x39, 0x400}], 0x0, 0x0) 16:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1819.262855][T19118] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:58 executing program 2: 16:01:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35, 0x80003}) 16:01:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:58 executing program 0: 16:01:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 16:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:58 executing program 0: 16:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1819.664524][T19233] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x80003}) 16:01:58 executing program 2: 16:01:58 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 16:01:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:58 executing program 0: 16:01:58 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x80003}) 16:01:58 executing program 2: 16:01:58 executing program 0: [ 1820.096579][T19263] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:58 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0x80003}) 16:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:59 executing program 0: 16:01:59 executing program 2: 16:01:59 executing program 4: syz_mount_image$ext4(&(0x7f0000000080)='ext2\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000000a00000001000000004000000040000080000000000000006d5ebe5a0000ffff53ef", 0x3a}], 0x0, 0x0) 16:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)) r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:59 executing program 2: 16:01:59 executing program 0: [ 1820.451625][T19287] EXT4-fs (loop4): VFS: Can't find ext4 filesystem 16:01:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35}) 16:01:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:01:59 executing program 4: 16:01:59 executing program 2: 16:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:59 executing program 0: 16:01:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35}) 16:01:59 executing program 4: 16:01:59 executing program 2: 16:01:59 executing program 4: 16:01:59 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:01:59 executing program 0: 16:01:59 executing program 1: r0 = syz_open_dev$sndseq(&(0x7f0000000600)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f0000068f50)={{0x80}, 'por\xff\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1f\x00\x00\xff\xff\xff\xff\xff\xff\xff\xef\x00\x00\x03\xff\x00\x00\x00\x00\x00\x00\x12\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x35}) 16:02:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:00 executing program 2: 16:02:00 executing program 4: 16:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:00 executing program 0: 16:02:00 executing program 1: 16:02:00 executing program 0: 16:02:00 executing program 4: 16:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:00 executing program 2: 16:02:00 executing program 1: 16:02:00 executing program 0: 16:02:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:00 executing program 4: 16:02:00 executing program 2: 16:02:00 executing program 1: 16:02:00 executing program 2: 16:02:00 executing program 1: 16:02:00 executing program 0: 16:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:00 executing program 4: 16:02:00 executing program 0: 16:02:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:00 executing program 1: 16:02:00 executing program 2: 16:02:00 executing program 4: 16:02:00 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:00 executing program 0: 16:02:01 executing program 1: 16:02:01 executing program 2: 16:02:01 executing program 0: 16:02:01 executing program 4: 16:02:01 executing program 1: 16:02:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:01 executing program 2: 16:02:01 executing program 4: 16:02:01 executing program 0: 16:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf0") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:01 executing program 2: 16:02:01 executing program 4: 16:02:01 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:01 executing program 0: 16:02:01 executing program 3: 16:02:01 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:01 executing program 2: 16:02:01 executing program 4: [ 1823.138191][T19533] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 16:02:02 executing program 3: 16:02:02 executing program 0: 16:02:02 executing program 4: 16:02:02 executing program 2: 16:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:02 executing program 3: 16:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:02 executing program 0: 16:02:02 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet_icmp_raw(0x2, 0x3, 0x1) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_mreq(r2, 0x29, 0x1f, &(0x7f0000000140)={@ipv4={[], [], @loopback}}, &(0x7f0000000480)=0x14) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) ioctl$sock_inet_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000100)) getsockopt$inet_tcp_buf(r1, 0x6, 0x0, &(0x7f00000001c0)=""/230, &(0x7f0000000040)=0xe6) ioctl(r1, 0x0, 0x0) write$binfmt_misc(r2, &(0x7f0000000140)=ANY=[], 0x3c25956b) flistxattr(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x3, 0x1) set_mempolicy(0x4001, &(0x7f0000000080)=0x2a4597bb, 0x2) bind$inet(r3, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r3, 0x0, 0x8001, 0x0) 16:02:02 executing program 4: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x0, &(0x7f00000000c0)={0x7fffffff}, 0x0, 0x8) rt_tgsigqueueinfo(r0, r1, 0x4000000000000007, &(0x7f0000000100)={0x0, 0x0, 0x50000}) rt_sigtimedwait(&(0x7f0000000080)={0x7fffffffffffff66}, &(0x7f0000a72ff0), 0x0, 0x8) 16:02:02 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/ptype\x00') readv(r0, &(0x7f0000000180)=[{&(0x7f00000001c0)=""/187, 0xbb}], 0x1) read(r0, &(0x7f0000000280)=""/251, 0xfb) [ 1823.640341][T19554] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 16:02:02 executing program 0: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000880)={'syz1\x00'}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000001c0)=""/166, 0xa6}], 0x1) ioctl$UI_SET_SNDBIT(0xffffffffffffffff, 0x4004556a, 0x0) 16:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:02 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47b") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1823.924899][T19611] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.5'. 16:02:02 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:02 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:02 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, 0x0) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x0, 0x0) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x4, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, 0x0, &(0x7f0000000380)) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, 0x0, 0x0) 16:02:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x7, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = fcntl$getown(r0, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/ip\x916_route\x00\x19\xd6\x10\x01\xed\x00\xc8\xbe\x85 \xbb\"\xb6X\'\x04\a\x96\xe5E\x91D1\x1aO*\xd8\xb6\xe5\x95\xa0\x90\xb0\xe6\xa6\x14\'\x80\xa3k\xef\x05Ba\x1b\x19\xce\x88\xd3\xc6\xe5:E\xf2\xbf\xf9\xf3[4.\xa2)^\x1ek\xe09\x0e8\x9f\xa5\x1a\x1b\xda\xdd\x87\x96\f,\x88Q\xac\t\xca]\xe5\xeb\x1e(\x18\x9ajx4\xb4\xfd\xfe\x15\x8f\x80\xc8\xda&V\x89J\x12\xd0h\xd9\x1c25\x9fL3\xe0\xe0u1\xa7\xf8-B\x9dB4r\xaa\x93\tS\x14\xbc}5\xa9\xf5\x16\xcei\xb4:\xf5\x80\xe2/\x9c\x15!\x80t\x19\x93\x93\x9c\xf9\xd2\x83\x8a\x19\xd8\xa8\xcc\xca\xdb\teU\x16\xd5\x98\x88\x8b\xe5G\x05)gB\xa0\xf6:T\xcf\x1atu\xe1\xe0d\xa9\xb53\x143\xa8{\xa9\x89\x94\x1e_\xbd\xda{\x9bA\xe8M\x86E\xff\xe9\xb1\xfb\x9d\xf6)0\x9a') sendfile(r1, r4, 0x0, 0x800000bf) 16:02:03 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(&(0x7f0000000180)='/dev/adsp#\x00', 0x0, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:03 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) request_key(&(0x7f0000000040)='rxrpc_s\x00', &(0x7f0000000080)={'syz'}, &(0x7f00000000c0)='/dev/v4l-subdev#\x00', 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, &(0x7f0000000100)='big_key\x00', &(0x7f0000000140)=@builtin='builtin_trusted\x00') r1 = syz_open_dev$adsp(0x0, 0x4, 0x10002) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000340)={0x0, 0x9, 0x30}, &(0x7f0000000380)=0xc) connect(0xffffffffffffffff, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_init_net_socket$llc(0x1a, 0x2, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000000)='/dev/v4l-subdev#\x00', 0x80, 0x10140) sendfile(r2, r0, 0x0, 0x4000800000bd) 16:02:03 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, 0x0, 0x0) 16:02:03 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 16:02:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 16:02:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x1, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x21f8, 0x400) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x6, 0xa, [0x4, 0x1, 0x8, 0x4, 0x80000000, 0x1, 0x7f, 0x100, 0x8, 0xfffffffffffffff7]}, &(0x7f0000000200)=0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={r3, 0x24, "c1edbbf0345dc8a12d06c4e7d3795cd21481a92ecc4a7b1c62045ca35dd76b6476943722"}, &(0x7f0000000280)=0x2c) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000100)={r6, 0x40, 0x65}, &(0x7f0000000140)=0x8) sendfile(r0, r5, 0x0, 0x800000bf) ioctl$TIOCCBRK(r5, 0x5428) 16:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, 0x0, 0x0) 16:02:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x7, 0x0) syz_init_net_socket$x25(0x9, 0x5, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = fcntl$getown(r0, 0x9) r4 = syz_open_procfs(r3, &(0x7f0000000100)='net/ip\x916_route\x00\x19\xd6\x10\x01\xed\x00\xc8\xbe\x85 \xbb\"\xb6X\'\x04\a\x96\xe5E\x91D1\x1aO*\xd8\xb6\xe5\x95\xa0\x90\xb0\xe6\xa6\x14\'\x80\xa3k\xef\x05Ba\x1b\x19\xce\x88\xd3\xc6\xe5:E\xf2\xbf\xf9\xf3[4.\xa2)^\x1ek\xe09\x0e8\x9f\xa5\x1a\x1b\xda\xdd\x87\x96\f,\x88Q\xac\t\xca]\xe5\xeb\x1e(\x18\x9ajx4\xb4\xfd\xfe\x15\x8f\x80\xc8\xda&V\x89J\x12\xd0h\xd9\x1c25\x9fL3\xe0\xe0u1\xa7\xf8-B\x9dB4r\xaa\x93\tS\x14\xbc}5\xa9\xf5\x16\xcei\xb4:\xf5\x80\xe2/\x9c\x15!\x80t\x19\x93\x93\x9c\xf9\xd2\x83\x8a\x19\xd8\xa8\xcc\xca\xdb\teU\x16\xd5\x98\x88\x8b\xe5G\x05)gB\xa0\xf6:T\xcf\x1atu\xe1\xe0d\xa9\xb53\x143\xa8{\xa9\x89\x94\x1e_\xbd\xda{\x9bA\xe8M\x86E\xff\xe9\xb1\xfb\x9d\xf6)0\x9a') sendfile(r1, r4, 0x0, 0x800000bf) 16:02:04 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 16:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280), 0x0) 16:02:04 executing program 2: socket$inet_udplite(0x2, 0x2, 0x88) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:04 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x21f8, 0x400) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x6, 0xa, [0x4, 0x1, 0x8, 0x4, 0x80000000, 0x1, 0x7f, 0x100, 0x8, 0xfffffffffffffff7]}, &(0x7f0000000200)=0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={r3, 0x24, "c1edbbf0345dc8a12d06c4e7d3795cd21481a92ecc4a7b1c62045ca35dd76b6476943722"}, &(0x7f0000000280)=0x2c) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000100)={r6, 0x40, 0x65}, &(0x7f0000000140)=0x8) sendfile(r0, r5, 0x0, 0x800000bf) ioctl$TIOCCBRK(r5, 0x5428) 16:02:04 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x40080002, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x2400) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'nr0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000a40)={'team0\x00', 0x0}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000380)=0x1432, &(0x7f00000003c0)=0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001040)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001000)={&(0x7f00000011c0)=ANY=[@ANYBLOB="20040000", @ANYRES16=r3, @ANYBLOB="00002abd7000ffdbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="b80002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r5, @ANYBLOB="6c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004002e00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="5800020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400010001ab010400000100036f030000000100020109000000f8ff09090700000008000100", @ANYRES32=r11, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000008000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="b00002003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff01000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004007f000000"], 0x420}, 0x1, 0x0, 0x0, 0x801}, 0x40000) listen(r1, 0x0) setrlimit(0x40000000000008, &(0x7f0000000040)={0x4847, 0xfffffffffffff001}) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r15 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r15, 0x0, 0x800000bf) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 16:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280), 0x0) 16:02:04 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:04 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x21f8, 0x400) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x6, 0xa, [0x4, 0x1, 0x8, 0x4, 0x80000000, 0x1, 0x7f, 0x100, 0x8, 0xfffffffffffffff7]}, &(0x7f0000000200)=0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={r3, 0x24, "c1edbbf0345dc8a12d06c4e7d3795cd21481a92ecc4a7b1c62045ca35dd76b6476943722"}, &(0x7f0000000280)=0x2c) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000100)={r6, 0x40, 0x65}, &(0x7f0000000140)=0x8) sendfile(r0, r5, 0x0, 0x800000bf) ioctl$TIOCCBRK(r5, 0x5428) 16:02:04 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280), 0x0) 16:02:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1826.325413][T20409] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 16:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$mouse(&(0x7f0000000180)='/dev/input/mouse#\x00', 0x21f8, 0x400) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f00000001c0)={0x0, 0x6, 0xa, [0x4, 0x1, 0x8, 0x4, 0x80000000, 0x1, 0x7f, 0x100, 0x8, 0xfffffffffffffff7]}, &(0x7f0000000200)=0x1c) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000240)={r3, 0x24, "c1edbbf0345dc8a12d06c4e7d3795cd21481a92ecc4a7b1c62045ca35dd76b6476943722"}, &(0x7f0000000280)=0x2c) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e20, @remote}}}, &(0x7f00000000c0)=0x84) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r4, 0x84, 0x7c, &(0x7f0000000100)={r6, 0x40, 0x65}, &(0x7f0000000140)=0x8) sendfile(r0, r5, 0x0, 0x800000bf) ioctl$TIOCCBRK(r5, 0x5428) 16:02:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x40080002, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x2400) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'nr0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000a40)={'team0\x00', 0x0}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000380)=0x1432, &(0x7f00000003c0)=0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001040)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001000)={&(0x7f00000011c0)=ANY=[@ANYBLOB="20040000", @ANYRES16=r3, @ANYBLOB="00002abd7000ffdbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="b80002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r5, @ANYBLOB="6c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004002e00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="5800020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400010001ab010400000100036f030000000100020109000000f8ff09090700000008000100", @ANYRES32=r11, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000008000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="b00002003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff01000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004007f000000"], 0x420}, 0x1, 0x0, 0x0, 0x801}, 0x40000) listen(r1, 0x0) setrlimit(0x40000000000008, &(0x7f0000000040)={0x4847, 0xfffffffffffff001}) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r15 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r15, 0x0, 0x800000bf) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 16:02:05 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) [ 1826.667995][T20499] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 16:02:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x100000001, 0x80000) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) fanotify_mark(r2, 0x80, 0x40000001, r3, &(0x7f0000000100)='./file0\x00') listen(r1, 0x0) connect(r0, &(0x7f0000000000)=@un=@abs={0x1}, 0x80) syz_open_dev$radio(0x0, 0x3, 0x2) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) 16:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:05 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:05 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x9, 0x0) r1 = socket$unix(0x1, 0x40080002, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x8001, 0x2400) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') accept4$packet(0xffffffffffffffff, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000100)=0x14, 0x800) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000140)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@empty}}, &(0x7f0000000240)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000300)=0x14, 0x800) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'nr0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000480)=0x14, 0x800) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@empty, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f00000006c0)=0xe8) accept4$packet(0xffffffffffffffff, &(0x7f0000000700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000740)=0x14, 0x80800) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000780)={'vxcan1\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000900)={{{@in=@broadcast, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000a00)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000a40)={'team0\x00', 0x0}) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000380)=0x1432, &(0x7f00000003c0)=0x1) accept4$packet(0xffffffffffffffff, &(0x7f0000000b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000b80)=0x14, 0x800) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f0000001040)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000001000)={&(0x7f00000011c0)=ANY=[@ANYBLOB="20040000", @ANYRES16=r3, @ANYBLOB="00002abd7000ffdbdf250200000008000100", @ANYRES32=r4, @ANYBLOB="b80002003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000080003000b0000000800040008000000080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000100000008000100", @ANYRES32=r5, @ANYBLOB="6c01020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r6, @ANYBLOB="080007000000000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000800000008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r8, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004002e00000040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32=r9, @ANYBLOB="08000100", @ANYRES32=r10, @ANYBLOB="5800020054000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b00000024000400010001ab010400000100036f030000000100020109000000f8ff09090700000008000100", @ANYRES32=r11, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000800030003000000080004000700000008000100", @ANYRES32=r12, @ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=r13, @ANYBLOB="08000100", @ANYRES32=r14, @ANYBLOB="b00002003c000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000000c00040072616e646f6d000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400ff01000038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000800030003000000080004007f000000"], 0x420}, 0x1, 0x0, 0x0, 0x801}, 0x40000) listen(r1, 0x0) setrlimit(0x40000000000008, &(0x7f0000000040)={0x4847, 0xfffffffffffff001}) capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r15 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r15, 0x0, 0x800000bf) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) 16:02:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84000) ioctl$KVM_GET_MSR_INDEX_LIST(r2, 0xc004ae02, &(0x7f0000000080)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) r3 = dup3(r1, r1, 0x80000) ioctl$RTC_EPOCH_READ(r3, 0x8008700d, &(0x7f0000000000)) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) [ 1826.993440][T20524] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.2'. 16:02:05 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:05 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:05 executing program 2: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000300)="6139d59e84ed0d319736712262d6a70c1c127b062d133c7b82cc9d82dfddbead1d9303370d8a4c2b1d583a2e6c3db8eda1b831edc2ba5a6e11b37e94cb3ff26221e3fb6da597dbedad2e77eb39462c0351e469fcfdfff706772a95daee0fbf0083a9638b1d1512d8c1463cda78ddb5e87b72f1b128bef8250bae4abe53cc65a9b69926ce29576a653047274e213d69b62871943aef3050be1f6571a44e80bdaefe", 0xa1}, {&(0x7f0000000240)="a6c1a49e69", 0x5}, {&(0x7f00000003c0)="d7d68dcf07d58fe97bb01d94bcd7abe5e31440180093176f9e1d08e33b60891549e708c56295a865f94a6eee66b0988a1b5c0aa4d6f599efdecab621e7cdef202d536cfd65a6a0e496bcb1e3ce24077a1c172900105411728e355fde193a95b151710bc0d3ba0ced4309d72168956e213dc7a92183fab3c3dfa4ce6b2506a9ce19dd638c03aba8d9ce60c4e46eeb8c2f", 0x90}], 0x3, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) r3 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x1f, 0x100) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/sequencer\x00', 0x101000, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x20000, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/vga_arbiter\x00', 0x101000, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f0000001e80)={0x200, 0x3}) io_submit(r2, 0x7, &(0x7f0000001e40)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000600)="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", 0x1000, 0x3, 0x0, 0x1, r3}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x6, 0x8001, r0, &(0x7f0000001600)="1b2c8f662fce93306bedb3e85e5ef654d47c2259807e8cee330a12833e902bf6c8c6490461876f08d701de7fbcd8ad9d6cba7e151d2b6156afacb5c1c6292520c32e014eadc66e3e70175aac65013a2d4c7eb1c0a3c56b0aacd821a4f1e3ad236415ea11831c2da2147b4fc05b63dbda03a09769bfddd1966274a1a75a3f5d5584a1d40f17c273b958fa272f8d09815f9582", 0x92, 0x6, 0x0, 0x2, r4}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000001700)="d66e1c618f97bc9a95b0c6b03befad3bd9cf2dcca768d26d48a8d4544bf1b69f6060ee0e703b0bbb2fda38f89ac486c14102ffa3b7b4e8908cfdfb6130", 0x3d, 0x1, 0x0, 0x1, r5}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x6, 0x655, r0, &(0x7f00000017c0)="3f0bbf0ac1788b89a3408fe6f2a29c438d4512e2855a9c6910abbac654e7440b236e0d352ed44af5c21b04e224c910e025bce908ab46084144e2e3023abbe1e7e98a871206365f165adb0fa552bf2a6e85c24d123f600702ab3bcf244e541abed85938610f5580357fbd10657ac0d655dcea3b475e23f5b448a5ac7a3644952fa103f889ed12ce28f82fa45ef7bf2c5886e658ac0d23e5852c0ac9b5bb400d90ca12fb069dd6d8e6c947e5d3b3429c4697", 0xb1, 0xfffffffffffffff8, 0x0, 0x2, r1}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x2, 0x5, r0, &(0x7f00000018c0)="575ea706517534bad7bc2ff29aae0e9ce78e973353a605248f7d25410830a43fdce733ab6da7b8c60c8e187bd9d589e3da378b6fe33d4a182ce8a6963c0444092a38ab6ad03a57736505410567bcefa16e00198462eeb7779f2d3ca6bba06ba032c37541f7f84dedf7d181a84b584f238f998ae4430e9e70149bc67298a874b17632a6a995cf48e97d67dbb28170db5a9c9485c93cf1c3527809082651060cc23f2c2655f93e9532e5fe7b10fe4a9de972bc296d8b16a31360672151f702f56c1bb8a75bf0db070533b63a907fe99bf40f68a4984dfc77", 0xd7, 0x200, 0x0, 0x2}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff9, r1, &(0x7f0000001c40)="3deef19f61561e00f116ebe4eabc7d81272cef4eec98d3aa5b87d32c0f90a923fe96649d1f5366869ef779fe432ca973a653b9005435ab3176e9b7527a19bea1c7ce365083a724c9428a11799015105b9cb0e4b2eb99314f6b915035bfc9990c59deaa927e21341c3d5f56b32730421c8306a56b602fb93aa11cd14df671117b5f6adc8687dae511f15e6eb397aea5c891bdd37a691838e66509d5ad04918d58e8a08f52abf6f36455c200c14d3e31c9578204a6d8d3a5", 0xb7, 0x647, 0x0, 0x3, r6}, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0xb, 0x4, r1, &(0x7f0000001d00)="457b621a0c691651ea5bf84147ce93121d104a8a0a65d774e40b67d5754a728e94b68987842c60d6f62e5fee9e773f6b93272938fe844cd24896c3661b2e52ac232b25793bfe66fca28a2b3224cfbc01a9e5ee10aa4338ecb3a9c02fba833a393eb94fc09e2a0d91fabdce8a05bdb5053827d237e9e2c42b9d6501159e18160dbde01a1ef1135e5bd25a69a79367", 0x8e, 0xffff, 0x0, 0xb7fb2ccee851b344, r7}]) r8 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001b80)=0xe8) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000001bc0)={@local, @remote, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x6, 0xb97b, 0x9, 0x0, 0x7, 0x6f1c825a8e04759, r9}) r10 = socket$unix(0x1, 0x1, 0x0) bind$unix(r10, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r10, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) r11 = dup3(r0, r10, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r11, 0x6, 0x14, &(0x7f00000005c0), 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r11, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r10, 0x84, 0x70, &(0x7f0000000100)={r12, @in={{0x2, 0x4e21, @local}}, [0x0, 0x6, 0x447, 0x100000001, 0x10000, 0xffff, 0x5, 0x80, 0x6, 0x1, 0xfffffffffffffff9, 0x1000, 0x800, 0x7]}, &(0x7f0000000200)=0x100) r13 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r13, r1, 0x0, 0x8) 16:02:06 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:06 executing program 2: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x100000001, 0x80000) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) fanotify_mark(r2, 0x80, 0x40000001, r3, &(0x7f0000000100)='./file0\x00') listen(r1, 0x0) connect(r0, &(0x7f0000000000)=@un=@abs={0x1}, 0x80) syz_open_dev$radio(0x0, 0x3, 0x2) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) 16:02:06 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000300)="6139d59e84ed0d319736712262d6a70c1c127b062d133c7b82cc9d82dfddbead1d9303370d8a4c2b1d583a2e6c3db8eda1b831edc2ba5a6e11b37e94cb3ff26221e3fb6da597dbedad2e77eb39462c0351e469fcfdfff706772a95daee0fbf0083a9638b1d1512d8c1463cda78ddb5e87b72f1b128bef8250bae4abe53cc65a9b69926ce29576a653047274e213d69b62871943aef3050be1f6571a44e80bdaefe", 0xa1}, {&(0x7f0000000240)="a6c1a49e69", 0x5}, {&(0x7f00000003c0)="d7d68dcf07d58fe97bb01d94bcd7abe5e31440180093176f9e1d08e33b60891549e708c56295a865f94a6eee66b0988a1b5c0aa4d6f599efdecab621e7cdef202d536cfd65a6a0e496bcb1e3ce24077a1c172900105411728e355fde193a95b151710bc0d3ba0ced4309d72168956e213dc7a92183fab3c3dfa4ce6b2506a9ce19dd638c03aba8d9ce60c4e46eeb8c2f", 0x90}], 0x3, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) r3 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x1f, 0x100) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/sequencer\x00', 0x101000, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x20000, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/vga_arbiter\x00', 0x101000, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f0000001e80)={0x200, 0x3}) io_submit(r2, 0x7, &(0x7f0000001e40)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000600)="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", 0x1000, 0x3, 0x0, 0x1, r3}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x6, 0x8001, r0, &(0x7f0000001600)="1b2c8f662fce93306bedb3e85e5ef654d47c2259807e8cee330a12833e902bf6c8c6490461876f08d701de7fbcd8ad9d6cba7e151d2b6156afacb5c1c6292520c32e014eadc66e3e70175aac65013a2d4c7eb1c0a3c56b0aacd821a4f1e3ad236415ea11831c2da2147b4fc05b63dbda03a09769bfddd1966274a1a75a3f5d5584a1d40f17c273b958fa272f8d09815f9582", 0x92, 0x6, 0x0, 0x2, r4}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000001700)="d66e1c618f97bc9a95b0c6b03befad3bd9cf2dcca768d26d48a8d4544bf1b69f6060ee0e703b0bbb2fda38f89ac486c14102ffa3b7b4e8908cfdfb6130", 0x3d, 0x1, 0x0, 0x1, r5}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x6, 0x655, r0, &(0x7f00000017c0)="3f0bbf0ac1788b89a3408fe6f2a29c438d4512e2855a9c6910abbac654e7440b236e0d352ed44af5c21b04e224c910e025bce908ab46084144e2e3023abbe1e7e98a871206365f165adb0fa552bf2a6e85c24d123f600702ab3bcf244e541abed85938610f5580357fbd10657ac0d655dcea3b475e23f5b448a5ac7a3644952fa103f889ed12ce28f82fa45ef7bf2c5886e658ac0d23e5852c0ac9b5bb400d90ca12fb069dd6d8e6c947e5d3b3429c4697", 0xb1, 0xfffffffffffffff8, 0x0, 0x2, r1}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x2, 0x5, r0, &(0x7f00000018c0)="575ea706517534bad7bc2ff29aae0e9ce78e973353a605248f7d25410830a43fdce733ab6da7b8c60c8e187bd9d589e3da378b6fe33d4a182ce8a6963c0444092a38ab6ad03a57736505410567bcefa16e00198462eeb7779f2d3ca6bba06ba032c37541f7f84dedf7d181a84b584f238f998ae4430e9e70149bc67298a874b17632a6a995cf48e97d67dbb28170db5a9c9485c93cf1c3527809082651060cc23f2c2655f93e9532e5fe7b10fe4a9de972bc296d8b16a31360672151f702f56c1bb8a75bf0db070533b63a907fe99bf40f68a4984dfc77", 0xd7, 0x200, 0x0, 0x2}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff9, r1, &(0x7f0000001c40)="3deef19f61561e00f116ebe4eabc7d81272cef4eec98d3aa5b87d32c0f90a923fe96649d1f5366869ef779fe432ca973a653b9005435ab3176e9b7527a19bea1c7ce365083a724c9428a11799015105b9cb0e4b2eb99314f6b915035bfc9990c59deaa927e21341c3d5f56b32730421c8306a56b602fb93aa11cd14df671117b5f6adc8687dae511f15e6eb397aea5c891bdd37a691838e66509d5ad04918d58e8a08f52abf6f36455c200c14d3e31c9578204a6d8d3a5", 0xb7, 0x647, 0x0, 0x3, r6}, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0xb, 0x4, r1, &(0x7f0000001d00)="457b621a0c691651ea5bf84147ce93121d104a8a0a65d774e40b67d5754a728e94b68987842c60d6f62e5fee9e773f6b93272938fe844cd24896c3661b2e52ac232b25793bfe66fca28a2b3224cfbc01a9e5ee10aa4338ecb3a9c02fba833a393eb94fc09e2a0d91fabdce8a05bdb5053827d237e9e2c42b9d6501159e18160dbde01a1ef1135e5bd25a69a79367", 0x8e, 0xffff, 0x0, 0xb7fb2ccee851b344, r7}]) r8 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001b80)=0xe8) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000001bc0)={@local, @remote, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x6, 0xb97b, 0x9, 0x0, 0x7, 0x6f1c825a8e04759, r9}) r10 = socket$unix(0x1, 0x1, 0x0) bind$unix(r10, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r10, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) r11 = dup3(r0, r10, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r11, 0x6, 0x14, &(0x7f00000005c0), 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r11, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r10, 0x84, 0x70, &(0x7f0000000100)={r12, @in={{0x2, 0x4e21, @local}}, [0x0, 0x6, 0x447, 0x100000001, 0x10000, 0xffff, 0x5, 0x80, 0x6, 0x1, 0xfffffffffffffff9, 0x1000, 0x800, 0x7]}, &(0x7f0000000200)=0x100) r13 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r13, r1, 0x0, 0x8) 16:02:06 executing program 2: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:06 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:06 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:06 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(r0, &(0x7f0000000280)=[{&(0x7f0000000300)="6139d59e84ed0d319736712262d6a70c1c127b062d133c7b82cc9d82dfddbead1d9303370d8a4c2b1d583a2e6c3db8eda1b831edc2ba5a6e11b37e94cb3ff26221e3fb6da597dbedad2e77eb39462c0351e469fcfdfff706772a95daee0fbf0083a9638b1d1512d8c1463cda78ddb5e87b72f1b128bef8250bae4abe53cc65a9b69926ce29576a653047274e213d69b62871943aef3050be1f6571a44e80bdaefe", 0xa1}, {&(0x7f0000000240)="a6c1a49e69", 0x5}, {&(0x7f00000003c0)="d7d68dcf07d58fe97bb01d94bcd7abe5e31440180093176f9e1d08e33b60891549e708c56295a865f94a6eee66b0988a1b5c0aa4d6f599efdecab621e7cdef202d536cfd65a6a0e496bcb1e3ce24077a1c172900105411728e355fde193a95b151710bc0d3ba0ced4309d72168956e213dc7a92183fab3c3dfa4ce6b2506a9ce19dd638c03aba8d9ce60c4e46eeb8c2f", 0x90}], 0x3, 0x4) r1 = socket$unix(0x1, 0x1, 0x0) io_setup(0x8, &(0x7f00000004c0)=0x0) r3 = syz_open_dev$adsp(&(0x7f0000000500)='/dev/adsp#\x00', 0x1f, 0x100) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000001f00)='/dev/sequencer\x00', 0x101000, 0x0) r5 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000001740)='/dev/ubi_ctrl\x00', 0x20000, 0x0) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/vga_arbiter\x00', 0x101000, 0x0) r7 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000001dc0)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$KVM_GET_ONE_REG(r7, 0x4010aeab, &(0x7f0000001e80)={0x200, 0x3}) io_submit(r2, 0x7, &(0x7f0000001e40)=[&(0x7f0000000540)={0x0, 0x0, 0x0, 0x7, 0x1, r1, &(0x7f0000000600)="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", 0x1000, 0x3, 0x0, 0x1, r3}, &(0x7f00000016c0)={0x0, 0x0, 0x0, 0x6, 0x8001, r0, &(0x7f0000001600)="1b2c8f662fce93306bedb3e85e5ef654d47c2259807e8cee330a12833e902bf6c8c6490461876f08d701de7fbcd8ad9d6cba7e151d2b6156afacb5c1c6292520c32e014eadc66e3e70175aac65013a2d4c7eb1c0a3c56b0aacd821a4f1e3ad236415ea11831c2da2147b4fc05b63dbda03a09769bfddd1966274a1a75a3f5d5584a1d40f17c273b958fa272f8d09815f9582", 0x92, 0x6, 0x0, 0x2, r4}, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x7, 0x5, r0, &(0x7f0000001700)="d66e1c618f97bc9a95b0c6b03befad3bd9cf2dcca768d26d48a8d4544bf1b69f6060ee0e703b0bbb2fda38f89ac486c14102ffa3b7b4e8908cfdfb6130", 0x3d, 0x1, 0x0, 0x1, r5}, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x6, 0x655, r0, &(0x7f00000017c0)="3f0bbf0ac1788b89a3408fe6f2a29c438d4512e2855a9c6910abbac654e7440b236e0d352ed44af5c21b04e224c910e025bce908ab46084144e2e3023abbe1e7e98a871206365f165adb0fa552bf2a6e85c24d123f600702ab3bcf244e541abed85938610f5580357fbd10657ac0d655dcea3b475e23f5b448a5ac7a3644952fa103f889ed12ce28f82fa45ef7bf2c5886e658ac0d23e5852c0ac9b5bb400d90ca12fb069dd6d8e6c947e5d3b3429c4697", 0xb1, 0xfffffffffffffff8, 0x0, 0x2, r1}, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x2, 0x5, r0, &(0x7f00000018c0)="575ea706517534bad7bc2ff29aae0e9ce78e973353a605248f7d25410830a43fdce733ab6da7b8c60c8e187bd9d589e3da378b6fe33d4a182ce8a6963c0444092a38ab6ad03a57736505410567bcefa16e00198462eeb7779f2d3ca6bba06ba032c37541f7f84dedf7d181a84b584f238f998ae4430e9e70149bc67298a874b17632a6a995cf48e97d67dbb28170db5a9c9485c93cf1c3527809082651060cc23f2c2655f93e9532e5fe7b10fe4a9de972bc296d8b16a31360672151f702f56c1bb8a75bf0db070533b63a907fe99bf40f68a4984dfc77", 0xd7, 0x200, 0x0, 0x2}, &(0x7f0000001a40)={0x0, 0x0, 0x0, 0x8, 0xfffffffffffffff9, r1, &(0x7f0000001c40)="3deef19f61561e00f116ebe4eabc7d81272cef4eec98d3aa5b87d32c0f90a923fe96649d1f5366869ef779fe432ca973a653b9005435ab3176e9b7527a19bea1c7ce365083a724c9428a11799015105b9cb0e4b2eb99314f6b915035bfc9990c59deaa927e21341c3d5f56b32730421c8306a56b602fb93aa11cd14df671117b5f6adc8687dae511f15e6eb397aea5c891bdd37a691838e66509d5ad04918d58e8a08f52abf6f36455c200c14d3e31c9578204a6d8d3a5", 0xb7, 0x647, 0x0, 0x3, r6}, &(0x7f0000001e00)={0x0, 0x0, 0x0, 0xb, 0x4, r1, &(0x7f0000001d00)="457b621a0c691651ea5bf84147ce93121d104a8a0a65d774e40b67d5754a728e94b68987842c60d6f62e5fee9e773f6b93272938fe844cd24896c3661b2e52ac232b25793bfe66fca28a2b3224cfbc01a9e5ee10aa4338ecb3a9c02fba833a393eb94fc09e2a0d91fabdce8a05bdb5053827d237e9e2c42b9d6501159e18160dbde01a1ef1135e5bd25a69a79367", 0x8e, 0xffff, 0x0, 0xb7fb2ccee851b344, r7}]) r8 = syz_open_dev$cec(&(0x7f0000000480)='/dev/cec#\x00', 0x3, 0x2) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001a80)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@remote}}, &(0x7f0000001b80)=0xe8) ioctl$sock_inet6_SIOCDELRT(r8, 0x890c, &(0x7f0000001bc0)={@local, @remote, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x6, 0xb97b, 0x9, 0x0, 0x7, 0x6f1c825a8e04759, r9}) r10 = socket$unix(0x1, 0x1, 0x0) bind$unix(r10, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r10, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x4) r11 = dup3(r0, r10, 0x80000) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r11, 0x6, 0x14, &(0x7f00000005c0), 0x4) getsockopt$inet_sctp6_SCTP_CONTEXT(r11, 0x84, 0x11, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r10, 0x84, 0x70, &(0x7f0000000100)={r12, @in={{0x2, 0x4e21, @local}}, [0x0, 0x6, 0x447, 0x100000001, 0x10000, 0xffff, 0x5, 0x80, 0x6, 0x1, 0xfffffffffffffff9, 0x1000, 0x800, 0x7]}, &(0x7f0000000200)=0x100) r13 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r13, r1, 0x0, 0x8) 16:02:06 executing program 1: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x100000001, 0x80000) r3 = syz_open_dev$vbi(&(0x7f00000000c0)='/dev/vbi#\x00', 0x2, 0x2) fanotify_mark(r2, 0x80, 0x40000001, r3, &(0x7f0000000100)='./file0\x00') listen(r1, 0x0) connect(r0, &(0x7f0000000000)=@un=@abs={0x1}, 0x80) syz_open_dev$radio(0x0, 0x3, 0x2) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) 16:02:07 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:07 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:07 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) 16:02:07 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:07 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:07 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:07 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) 16:02:08 executing program 0: ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:08 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) 16:02:08 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r0, 0x4c80, 0x0) 16:02:08 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) move_mount(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', r2, &(0x7f0000000040)='./file0\x00', 0x63) 16:02:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:08 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:08 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:08 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:08 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:09 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:09 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:09 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:10 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:10 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:10 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') 16:02:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:11 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:11 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') 16:02:11 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:12 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') 16:02:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:12 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:12 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:12 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') 16:02:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:13 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:13 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) close(r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0b") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) close(r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) close(r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:14 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:14 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:14 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) close(r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:15 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) close(r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:15 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47b") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:15 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) close(r1) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:16 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:16 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:16 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:16 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf0") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:17 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:17 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:18 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:18 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000003000)=@abs={0x1}, 0x8) r8 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r8, 0x0, 0x800000bf) 16:02:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:18 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:19 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 16:02:19 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 16:02:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000003000)=@abs={0x1}, 0x8) r8 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r8, 0x0, 0x800000bf) 16:02:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:20 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) 16:02:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) socket$unix(0x1, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r7 = socket$unix(0x1, 0x1, 0x0) bind$unix(r7, &(0x7f0000003000)=@abs={0x1}, 0x8) r8 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r8, 0x0, 0x800000bf) 16:02:20 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:20 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) socket$unix(0x1, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:21 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) r9 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r1, r9, 0x0, 0x800000bf) 16:02:21 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) socket$unix(0x1, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) socket$unix(0x1, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:21 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:21 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) socket$unix(0x1, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(r0, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) listen(r1, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r2, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) socket$unix(0x1, 0x1, 0x0) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:22 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000280)=0x0) r6 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r1, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r2, r3, r4}}}, @cred={{0x1c, 0x1, 0x2, {r5, r6, r7}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000003000)=@abs={0x1}, 0x8) ioctl$VHOST_SET_VRING_BASE(r0, 0x4008af12, &(0x7f00000004c0)={0x2, 0x8}) listen(r8, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) sendfile(r1, 0xffffffffffffffff, 0x0, 0x800000bf) 16:02:22 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) removexattr(&(0x7f0000000440)='./file0/file0\x00', &(0x7f0000000480)=@known='trusted.overlay.impure\x00') sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) socket$rxrpc(0x21, 0x2, 0x2) 16:02:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:23 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:23 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) ioctl$VIDIOC_G_INPUT(r1, 0x80045626, &(0x7f0000000040)) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) 16:02:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x7fff, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r6, 0x0, 0x800000bf) 16:02:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r6, 0x0, 0x800000bf) 16:02:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x3a2) r2 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) ioctl$NBD_DO_IT(r2, 0xab03) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0x1, 0x2) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r1) sendfile(r0, r3, 0x0, 0x800000bf) 16:02:25 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:26 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r6, 0x0, 0x800000bf) 16:02:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) r5 = getuid() stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, r5, r6}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r7 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r7, 0x0, 0x800000bf) 16:02:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r1, 0x0) connect(r0, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000040)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x48, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x34, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x20004004}, 0x4000000) 16:02:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)="4db2ba9f7020b071096fe6f9e54cd9f212cc0f4fce730e39626bc096f9caa931d3675b92850ddd2ebbbcd9a1707da5b39bad1467435a983738aaa3f9fc38981fb119019814d3b7079b3e381a89b2ca287078661d6f9774117141122fd05c4f193ab70e8ab44e4892bcd0f8bd1ad93aca1e5833f778987073f1384d6916e883cefbe0e94737a9f0fc263090aa5efa3a3dde7d46ac5fe480f7e3e635ba98c1a20135c348e188f6c15331b8504618", 0xad, r1}, 0x68) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r3 = syz_open_dev$radio(0x0, 0x3, 0x2) r4 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000300)=""/4096) setsockopt$ax25_int(r3, 0x101, 0x2, &(0x7f0000000080)=0xedca, 0x4) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r3, r5, 0x0, 0x80000001) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) 16:02:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:26 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)="4db2ba9f7020b071096fe6f9e54cd9f212cc0f4fce730e39626bc096f9caa931d3675b92850ddd2ebbbcd9a1707da5b39bad1467435a983738aaa3f9fc38981fb119019814d3b7079b3e381a89b2ca287078661d6f9774117141122fd05c4f193ab70e8ab44e4892bcd0f8bd1ad93aca1e5833f778987073f1384d6916e883cefbe0e94737a9f0fc263090aa5efa3a3dde7d46ac5fe480f7e3e635ba98c1a20135c348e188f6c15331b8504618", 0xad, r1}, 0x68) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r3 = syz_open_dev$radio(0x0, 0x3, 0x2) r4 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000300)=""/4096) setsockopt$ax25_int(r3, 0x101, 0x2, &(0x7f0000000080)=0xedca, 0x4) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r3, r5, 0x0, 0x80000001) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) 16:02:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)="4db2ba9f7020b071096fe6f9e54cd9f212cc0f4fce730e39626bc096f9caa931d3675b92850ddd2ebbbcd9a1707da5b39bad1467435a983738aaa3f9fc38981fb119019814d3b7079b3e381a89b2ca287078661d6f9774117141122fd05c4f193ab70e8ab44e4892bcd0f8bd1ad93aca1e5833f778987073f1384d6916e883cefbe0e94737a9f0fc263090aa5efa3a3dde7d46ac5fe480f7e3e635ba98c1a20135c348e188f6c15331b8504618", 0xad, r1}, 0x68) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r3 = syz_open_dev$radio(0x0, 0x3, 0x2) r4 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000300)=""/4096) setsockopt$ax25_int(r3, 0x101, 0x2, &(0x7f0000000080)=0xedca, 0x4) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r3, r5, 0x0, 0x80000001) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) 16:02:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000280)=0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0x0, r5}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r6 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r6, 0x0, 0x800000bf) 16:02:27 executing program 5 (fault-call:4 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:27 executing program 1 (fault-call:1 fault-nth:0): r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:27 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r5, 0x0, 0x800000bf) [ 1848.614856][T25486] FAULT_INJECTION: forcing a failure. [ 1848.614856][T25486] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.627808][T25486] CPU: 1 PID: 25486 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1848.635447][T25486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.645505][T25486] Call Trace: [ 1848.648809][T25486] dump_stack+0x16f/0x1f0 [ 1848.653150][T25486] should_fail.cold+0xa/0x15 [ 1848.657757][T25486] ? fault_create_debugfs_attr+0x180/0x180 [ 1848.663577][T25486] ? __kasan_check_read+0x11/0x20 [ 1848.668620][T25486] __should_failslab+0x121/0x190 [ 1848.673573][T25486] should_failslab+0x9/0x14 [ 1848.678084][T25486] __kmalloc+0x2ce/0x760 [ 1848.682343][T25486] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 1848.688076][T25486] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 1848.693807][T25486] ? rcu_read_lock_sched_held+0x110/0x130 [ 1848.699543][T25486] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1848.705289][T25486] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1848.710854][T25486] ? tomoyo_path_number_perm+0x193/0x520 [ 1848.716510][T25486] tomoyo_path_number_perm+0x1dd/0x520 [ 1848.721980][T25486] ? tomoyo_path_number_perm+0x193/0x520 [ 1848.727722][T25486] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1848.733543][T25486] ? __f_unlock_pos+0x19/0x20 [ 1848.738261][T25486] ? __fget+0x388/0x560 [ 1848.743016][T25486] ? ksys_dup3+0x3e0/0x3e0 [ 1848.747439][T25486] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1848.753693][T25486] ? fput_many+0x12c/0x1a0 [ 1848.758124][T25486] tomoyo_file_ioctl+0x23/0x30 [ 1848.762902][T25486] security_file_ioctl+0x77/0xc0 [ 1848.767848][T25486] ksys_ioctl+0x57/0xd0 [ 1848.772021][T25486] __x64_sys_ioctl+0x73/0xb0 [ 1848.776635][T25486] do_syscall_64+0xfd/0x6a0 [ 1848.781246][T25486] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1848.787326][T25486] RIP: 0033:0x459829 [ 1848.792396][T25486] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1848.812199][T25486] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1848.820629][T25486] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1848.828634][T25486] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1848.836611][T25486] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1848.844590][T25486] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1848.852590][T25486] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)="4db2ba9f7020b071096fe6f9e54cd9f212cc0f4fce730e39626bc096f9caa931d3675b92850ddd2ebbbcd9a1707da5b39bad1467435a983738aaa3f9fc38981fb119019814d3b7079b3e381a89b2ca287078661d6f9774117141122fd05c4f193ab70e8ab44e4892bcd0f8bd1ad93aca1e5833f778987073f1384d6916e883cefbe0e94737a9f0fc263090aa5efa3a3dde7d46ac5fe480f7e3e635ba98c1a20135c348e188f6c15331b8504618", 0xad, r1}, 0x68) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r3 = syz_open_dev$radio(0x0, 0x3, 0x2) r4 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000300)=""/4096) setsockopt$ax25_int(r3, 0x101, 0x2, &(0x7f0000000080)=0xedca, 0x4) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r3, r5, 0x0, 0x80000001) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) [ 1848.860673][T25486] ERROR: Out of memory at tomoyo_realpath_from_path. [ 1848.902105][T25516] FAULT_INJECTION: forcing a failure. [ 1848.902105][T25516] name failslab, interval 1, probability 0, space 0, times 0 [ 1848.914957][T25516] CPU: 0 PID: 25516 Comm: syz-executor.1 Not tainted 5.2.0+ #71 [ 1848.922601][T25516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1848.932658][T25516] Call Trace: [ 1848.935960][T25516] dump_stack+0x16f/0x1f0 [ 1848.940310][T25516] should_fail.cold+0xa/0x15 [ 1848.944933][T25516] ? fault_create_debugfs_attr+0x180/0x180 [ 1848.950774][T25516] __should_failslab+0x121/0x190 [ 1848.955728][T25516] should_failslab+0x9/0x14 [ 1848.960244][T25516] kmem_cache_alloc_node+0x25d/0x720 [ 1848.965645][T25516] __alloc_skb+0xd5/0x5e0 [ 1848.970007][T25516] ? netdev_alloc_frag+0x140/0x140 [ 1848.975135][T25516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1848.981447][T25516] ? netlink_autobind.isra.0+0x231/0x310 [ 1848.987098][T25516] netlink_sendmsg+0x972/0xd60 [ 1848.991878][T25516] ? netlink_unicast+0x710/0x710 [ 1848.996834][T25516] ? aa_sock_msg_perm.isra.0+0xba/0x170 [ 1849.002389][T25516] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1849.007858][T25516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.014112][T25516] ? security_socket_sendmsg+0x8d/0xc0 [ 1849.019584][T25516] ? netlink_unicast+0x710/0x710 [ 1849.024603][T25516] sock_sendmsg+0xd7/0x130 [ 1849.029039][T25516] sock_write_iter+0x27c/0x3e0 [ 1849.033843][T25516] ? sock_sendmsg+0x130/0x130 [ 1849.038613][T25516] do_iter_readv_writev+0x5f8/0x8f0 [ 1849.043852][T25516] ? no_seek_end_llseek_size+0x70/0x70 [ 1849.049347][T25516] ? apparmor_file_permission+0x25/0x30 [ 1849.054946][T25516] ? rw_verify_area+0x126/0x360 [ 1849.059818][T25516] do_iter_write+0x184/0x610 [ 1849.064422][T25516] ? dup_iter+0x250/0x250 [ 1849.068779][T25516] vfs_writev+0x1b3/0x2f0 [ 1849.073134][T25516] ? vfs_iter_write+0xb0/0xb0 [ 1849.077848][T25516] ? ksys_dup3+0x3e0/0x3e0 [ 1849.082289][T25516] ? wait_for_completion+0x440/0x440 [ 1849.087635][T25516] ? __fget_light+0x1a9/0x230 [ 1849.092365][T25516] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1849.098655][T25516] do_writev+0x15b/0x330 [ 1849.102916][T25516] ? vfs_writev+0x2f0/0x2f0 [ 1849.107477][T25516] ? do_syscall_64+0x26/0x6a0 [ 1849.112160][T25516] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.118230][T25516] ? do_syscall_64+0x26/0x6a0 [ 1849.122919][T25516] __x64_sys_writev+0x75/0xb0 [ 1849.127635][T25516] do_syscall_64+0xfd/0x6a0 [ 1849.132171][T25516] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.138076][T25516] RIP: 0033:0x459829 [ 1849.141980][T25516] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1849.161586][T25516] RSP: 002b:00007ff9d69bac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1849.170009][T25516] RAX: ffffffffffffffda RBX: 00007ff9d69bac90 RCX: 0000000000459829 [ 1849.177983][T25516] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000003 [ 1849.185966][T25516] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1849.194127][T25516] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff9d69bb6d4 [ 1849.202108][T25516] R13: 00000000004c69f5 R14: 00000000004e0e70 R15: 0000000000000004 16:02:28 executing program 5 (fault-call:4 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:28 executing program 1 (fault-call:1 fault-nth:1): r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:28 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) bind$unix(r2, &(0x7f0000003000)=@abs={0x1}, 0x8) listen(r2, 0x0) connect(r1, &(0x7f0000985ff8)=@un=@abs={0x1}, 0x8) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000180)={&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f00000000c0)="4db2ba9f7020b071096fe6f9e54cd9f212cc0f4fce730e39626bc096f9caa931d3675b92850ddd2ebbbcd9a1707da5b39bad1467435a983738aaa3f9fc38981fb119019814d3b7079b3e381a89b2ca287078661d6f9774117141122fd05c4f193ab70e8ab44e4892bcd0f8bd1ad93aca1e5833f778987073f1384d6916e883cefbe0e94737a9f0fc263090aa5efa3a3dde7d46ac5fe480f7e3e635ba98c1a20135c348e188f6c15331b8504618", 0xad, r1}, 0x68) openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20ncci\x00', 0x0, 0x0) r3 = syz_open_dev$radio(0x0, 0x3, 0x2) r4 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r4, 0x3, &(0x7f0000000300)=""/4096) setsockopt$ax25_int(r3, 0x101, 0x2, &(0x7f0000000080)=0xedca, 0x4) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r3, r5, 0x0, 0x80000001) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)=0x8) 16:02:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1849.633450][T25750] FAULT_INJECTION: forcing a failure. [ 1849.633450][T25750] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 1849.646703][T25750] CPU: 0 PID: 25750 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1849.654337][T25750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1849.664398][T25750] Call Trace: [ 1849.667707][T25750] dump_stack+0x16f/0x1f0 [ 1849.672056][T25750] should_fail.cold+0xa/0x15 [ 1849.676660][T25750] ? is_bpf_text_address+0xae/0x170 [ 1849.681878][T25750] ? fault_create_debugfs_attr+0x180/0x180 [ 1849.687710][T25750] ? lock_downgrade+0x920/0x920 [ 1849.692585][T25750] should_fail_alloc_page+0x50/0x60 [ 1849.697802][T25750] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1849.703188][T25750] ? __kasan_check_read+0x11/0x20 [ 1849.708224][T25750] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1849.713963][T25750] ? __kasan_check_read+0x11/0x20 [ 1849.718999][T25750] cache_grow_begin+0x90/0xc90 [ 1849.723779][T25750] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1849.729525][T25750] ? trace_hardirqs_off+0x62/0x210 [ 1849.734646][T25750] __kmalloc+0x694/0x760 [ 1849.738896][T25750] ? tomoyo_realpath_from_path+0xc0/0x7b0 [ 1849.744645][T25750] ? tomoyo_realpath_from_path+0xcd/0x7b0 [ 1849.750387][T25750] tomoyo_realpath_from_path+0xcd/0x7b0 [ 1849.755950][T25750] ? tomoyo_path_number_perm+0x193/0x520 [ 1849.761600][T25750] tomoyo_path_number_perm+0x1dd/0x520 [ 1849.767076][T25750] ? tomoyo_path_number_perm+0x193/0x520 [ 1849.772724][T25750] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 1849.778536][T25750] ? __f_unlock_pos+0x19/0x20 [ 1849.783248][T25750] ? __fget+0x388/0x560 [ 1849.787420][T25750] ? ksys_dup3+0x3e0/0x3e0 [ 1849.791846][T25750] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1849.798099][T25750] ? fput_many+0x12c/0x1a0 [ 1849.802523][T25750] tomoyo_file_ioctl+0x23/0x30 [ 1849.807386][T25750] security_file_ioctl+0x77/0xc0 [ 1849.812337][T25750] ksys_ioctl+0x57/0xd0 [ 1849.816502][T25750] __x64_sys_ioctl+0x73/0xb0 [ 1849.821101][T25750] do_syscall_64+0xfd/0x6a0 [ 1849.825631][T25750] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1849.831525][T25750] RIP: 0033:0x459829 [ 1849.835435][T25750] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1849.855049][T25750] RSP: 002b:00007fd72c877c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1849.863471][T25750] RAX: ffffffffffffffda RBX: 00007fd72c877c90 RCX: 0000000000459829 [ 1849.871475][T25750] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 16:02:28 executing program 2 (fault-call:3 fault-nth:0): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1849.879446][T25750] RBP: 000000000075c118 R08: 0000000000000000 R09: 0000000000000000 [ 1849.887417][T25750] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8786d4 [ 1849.895399][T25750] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000004 16:02:28 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r5, 0x0, 0x800000bf) [ 1850.052811][T25758] FAULT_INJECTION: forcing a failure. [ 1850.052811][T25758] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.065738][T25758] CPU: 0 PID: 25758 Comm: syz-executor.2 Not tainted 5.2.0+ #71 [ 1850.073381][T25758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.083444][T25758] Call Trace: [ 1850.086763][T25758] dump_stack+0x16f/0x1f0 [ 1850.091115][T25758] should_fail.cold+0xa/0x15 [ 1850.095723][T25758] ? fault_create_debugfs_attr+0x180/0x180 [ 1850.101551][T25758] __should_failslab+0x121/0x190 [ 1850.106502][T25758] should_failslab+0x9/0x14 [ 1850.111020][T25758] kmem_cache_alloc_node+0x25d/0x720 [ 1850.116335][T25758] __alloc_skb+0xd5/0x5e0 [ 1850.120683][T25758] ? netdev_alloc_frag+0x140/0x140 [ 1850.125812][T25758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.132072][T25758] ? netlink_autobind.isra.0+0x231/0x310 [ 1850.137727][T25758] netlink_sendmsg+0x972/0xd60 [ 1850.142511][T25758] ? netlink_unicast+0x710/0x710 [ 1850.147458][T25758] ? aa_sock_msg_perm.isra.0+0xba/0x170 16:02:28 executing program 5 (fault-call:4 fault-nth:2): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:28 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1850.147482][T25758] ? apparmor_socket_sendmsg+0x2a/0x30 [ 1850.158464][T25758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.164713][T25758] ? security_socket_sendmsg+0x8d/0xc0 [ 1850.170176][T25758] ? netlink_unicast+0x710/0x710 [ 1850.175124][T25758] sock_sendmsg+0xd7/0x130 [ 1850.179553][T25758] sock_write_iter+0x27c/0x3e0 [ 1850.184330][T25758] ? sock_sendmsg+0x130/0x130 [ 1850.189035][T25758] do_iter_readv_writev+0x5f8/0x8f0 [ 1850.194241][T25758] ? no_seek_end_llseek_size+0x70/0x70 [ 1850.199709][T25758] ? apparmor_file_permission+0x25/0x30 [ 1850.205271][T25758] ? rw_verify_area+0x126/0x360 [ 1850.210129][T25758] do_iter_write+0x184/0x610 [ 1850.214726][T25758] ? dup_iter+0x250/0x250 [ 1850.219075][T25758] vfs_writev+0x1b3/0x2f0 [ 1850.223411][T25758] ? vfs_iter_write+0xb0/0xb0 [ 1850.228104][T25758] ? ksys_dup3+0x3e0/0x3e0 [ 1850.232523][T25758] ? wait_for_completion+0x440/0x440 [ 1850.232542][T25758] ? __fget_light+0x1a9/0x230 [ 1850.232562][T25758] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.232578][T25758] do_writev+0x15b/0x330 [ 1850.232594][T25758] ? vfs_writev+0x2f0/0x2f0 [ 1850.232610][T25758] ? do_syscall_64+0x26/0x6a0 [ 1850.232627][T25758] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1850.232641][T25758] ? do_syscall_64+0x26/0x6a0 [ 1850.232659][T25758] __x64_sys_writev+0x75/0xb0 [ 1850.232676][T25758] do_syscall_64+0xfd/0x6a0 [ 1850.232696][T25758] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1850.232714][T25758] RIP: 0033:0x459829 [ 1850.242675][T25758] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1850.242684][T25758] RSP: 002b:00007f6d1a8fec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 1850.242697][T25758] RAX: ffffffffffffffda RBX: 00007f6d1a8fec90 RCX: 0000000000459829 [ 1850.242705][T25758] RDX: 0000000000000001 RSI: 0000000020000280 RDI: 0000000000000004 [ 1850.242713][T25758] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1850.242722][T25758] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6d1a8ff6d4 16:02:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) listen(r0, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) getgroups(0x5, &(0x7f0000000240)=[0xee00, 0xffffffffffffffff, 0xee00, 0xffffffffffffffff, 0xee00]) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2, r3}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r4}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r5 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r5, 0x0, 0x800000bf) 16:02:29 executing program 2 (fault-call:3 fault-nth:1): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1850.242730][T25758] R13: 00000000004c69f5 R14: 00000000004e0e70 R15: 0000000000000005 16:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="0f0000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1850.531589][T25874] FAULT_INJECTION: forcing a failure. [ 1850.531589][T25874] name failslab, interval 1, probability 0, space 0, times 0 [ 1850.544661][T25874] CPU: 1 PID: 25874 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1850.552298][T25874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1850.552306][T25874] Call Trace: [ 1850.552332][T25874] dump_stack+0x16f/0x1f0 [ 1850.552371][T25874] should_fail.cold+0xa/0x15 [ 1850.574940][T25874] ? fault_create_debugfs_attr+0x180/0x180 [ 1850.580768][T25874] __should_failslab+0x121/0x190 [ 1850.585719][T25874] should_failslab+0x9/0x14 [ 1850.590229][T25874] kmem_cache_alloc_trace+0x2c3/0x770 [ 1850.595606][T25874] ? __radix_tree_lookup+0x1ef/0x260 [ 1850.600974][T25874] loop_add+0x51/0x8d0 [ 1850.605047][T25874] ? idr_find+0x47/0x60 [ 1850.609209][T25874] loop_control_ioctl+0x165/0x360 [ 1850.614242][T25874] ? loop_add+0x8d0/0x8d0 [ 1850.618586][T25874] ? loop_add+0x8d0/0x8d0 [ 1850.622919][T25874] do_vfs_ioctl+0xdb6/0x13e0 [ 1850.627517][T25874] ? ioctl_preallocate+0x210/0x210 [ 1850.632633][T25874] ? __fget+0x388/0x560 [ 1850.636831][T25874] ? ksys_dup3+0x3e0/0x3e0 [ 1850.641257][T25874] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1850.647505][T25874] ? fput_many+0x12c/0x1a0 [ 1850.651933][T25874] ? tomoyo_file_ioctl+0x23/0x30 [ 1850.656874][T25874] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1850.663118][T25874] ? security_file_ioctl+0x8d/0xc0 [ 1850.668239][T25874] ksys_ioctl+0xab/0xd0 [ 1850.672412][T25874] __x64_sys_ioctl+0x73/0xb0 [ 1850.677012][T25874] do_syscall_64+0xfd/0x6a0 [ 1850.681524][T25874] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1850.687420][T25874] RIP: 0033:0x459829 [ 1850.691320][T25874] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1850.710926][T25874] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1850.719348][T25874] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 16:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="c00000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) [ 1850.727322][T25874] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1850.735294][T25874] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1850.744012][T25874] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1850.751989][T25874] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:29 executing program 3 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:29 executing program 5 (fault-call:4 fault-nth:3): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:29 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="c00e00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:29 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) [ 1851.087863][T25997] FAULT_INJECTION: forcing a failure. [ 1851.087863][T25997] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.100661][T25997] CPU: 0 PID: 25997 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1851.108302][T25997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.118368][T25997] Call Trace: [ 1851.119875][T25984] FAULT_INJECTION: forcing a failure. [ 1851.119875][T25984] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.121693][T25997] dump_stack+0x16f/0x1f0 [ 1851.138680][T25997] should_fail.cold+0xa/0x15 [ 1851.143325][T25997] ? fault_create_debugfs_attr+0x180/0x180 [ 1851.149185][T25997] __should_failslab+0x121/0x190 [ 1851.154161][T25997] should_failslab+0x9/0x14 [ 1851.158690][T25997] kmem_cache_alloc_node+0x25d/0x720 [ 1851.163994][T25997] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1851.169293][T25997] ? trace_hardirqs_on+0x67/0x220 [ 1851.174336][T25997] ? __kasan_check_read+0x11/0x20 [ 1851.179383][T25997] copy_process+0x44da/0x6880 [ 1851.184062][T25997] ? get_pid_task+0xcb/0x190 [ 1851.188666][T25997] ? find_held_lock+0x35/0x130 [ 1851.193460][T25997] ? get_pid_task+0xcb/0x190 [ 1851.198103][T25997] ? __cleanup_sighand+0x60/0x60 [ 1851.203058][T25997] ? __f_unlock_pos+0x19/0x20 [ 1851.207758][T25997] ? lock_downgrade+0x920/0x920 [ 1851.212655][T25997] ? vfs_write+0x34c/0x5d0 [ 1851.217085][T25997] _do_fork+0x146/0xf60 [ 1851.221251][T25997] ? copy_init_mm+0x20/0x20 [ 1851.225769][T25997] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1851.231327][T25997] ? wait_for_completion+0x440/0x440 [ 1851.236626][T25997] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1851.242991][T25997] __x64_sys_clone+0x18d/0x250 [ 1851.247761][T25997] ? ksys_write+0x1cf/0x290 [ 1851.252270][T25997] ? __ia32_sys_vfork+0xc0/0xc0 [ 1851.257133][T25997] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1851.262437][T25997] ? trace_hardirqs_on+0x67/0x220 [ 1851.267475][T25997] do_syscall_64+0xfd/0x6a0 [ 1851.271992][T25997] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.277886][T25997] RIP: 0033:0x459829 [ 1851.281828][T25997] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1851.301464][T25997] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1851.309898][T25997] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1851.317887][T25997] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1851.325877][T25997] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1851.333862][T25997] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1851.341852][T25997] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1851.349874][T25984] CPU: 1 PID: 25984 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1851.357533][T25984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.367591][T25984] Call Trace: [ 1851.370980][T25984] dump_stack+0x16f/0x1f0 [ 1851.375324][T25984] should_fail.cold+0xa/0x15 [ 1851.380539][T25984] ? fault_create_debugfs_attr+0x180/0x180 [ 1851.386371][T25984] __should_failslab+0x121/0x190 [ 1851.391334][T25984] should_failslab+0x9/0x14 [ 1851.395846][T25984] kmem_cache_alloc_node_trace+0x269/0x730 [ 1851.401672][T25984] __kmalloc_node+0x3d/0x70 [ 1851.406188][T25984] blk_mq_alloc_tag_set+0x346/0xd40 [ 1851.411398][T25984] loop_add+0x286/0x8d0 [ 1851.415649][T25984] ? idr_find+0x47/0x60 [ 1851.419819][T25984] loop_control_ioctl+0x165/0x360 [ 1851.424849][T25984] ? loop_add+0x8d0/0x8d0 [ 1851.429188][T25984] ? loop_add+0x8d0/0x8d0 [ 1851.433523][T25984] do_vfs_ioctl+0xdb6/0x13e0 16:02:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="effd00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:30 executing program 3 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1851.438124][T25984] ? ioctl_preallocate+0x210/0x210 [ 1851.443240][T25984] ? __fget+0x388/0x560 [ 1851.447420][T25984] ? ksys_dup3+0x3e0/0x3e0 [ 1851.451847][T25984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1851.458113][T25984] ? fput_many+0x12c/0x1a0 [ 1851.462543][T25984] ? tomoyo_file_ioctl+0x23/0x30 [ 1851.467501][T25984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1851.473783][T25984] ? security_file_ioctl+0x8d/0xc0 [ 1851.479348][T25984] ksys_ioctl+0xab/0xd0 [ 1851.483529][T25984] __x64_sys_ioctl+0x73/0xb0 [ 1851.488146][T25984] do_syscall_64+0xfd/0x6a0 [ 1851.492671][T25984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.498564][T25984] RIP: 0033:0x459829 [ 1851.502448][T25984] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1851.522039][T25984] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1851.530465][T25984] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 16:02:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) getresuid(&(0x7f0000000180)=0x0, &(0x7f00000001c0), &(0x7f0000000200)) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1, r2}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r3}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r4 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r4, 0x0, 0x800000bf) [ 1851.538442][T25984] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1851.546410][T25984] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1851.554369][T25984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1851.562329][T25984] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:30 executing program 5 (fault-call:4 fault-nth:4): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1851.709092][T26111] FAULT_INJECTION: forcing a failure. [ 1851.709092][T26111] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1851.722739][T26111] CPU: 1 PID: 26111 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1851.730387][T26111] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1851.740812][T26111] Call Trace: [ 1851.744138][T26111] dump_stack+0x16f/0x1f0 [ 1851.748489][T26111] should_fail.cold+0xa/0x15 [ 1851.753121][T26111] ? fault_create_debugfs_attr+0x180/0x180 16:02:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="0f0000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1851.758944][T26111] ? ___might_sleep+0x131/0x280 [ 1851.763818][T26111] should_fail_alloc_page+0x50/0x60 [ 1851.769042][T26111] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1851.774448][T26111] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1851.780186][T26111] ? copy_process+0x44da/0x6880 [ 1851.785062][T26111] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1851.790365][T26111] ? trace_hardirqs_on+0x67/0x220 [ 1851.795422][T26111] ? __kasan_check_read+0x11/0x20 [ 1851.800477][T26111] copy_process+0x3f8/0x6880 [ 1851.805082][T26111] ? get_pid_task+0xcb/0x190 16:02:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) r1 = getpgrp(0xffffffffffffffff) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r2}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r3, 0x0, 0x800000bf) [ 1851.809701][T26111] ? find_held_lock+0x35/0x130 [ 1851.814484][T26111] ? get_pid_task+0xcb/0x190 [ 1851.819105][T26111] ? __cleanup_sighand+0x60/0x60 [ 1851.824066][T26111] ? __f_unlock_pos+0x19/0x20 [ 1851.828860][T26111] ? lock_downgrade+0x920/0x920 [ 1851.833727][T26111] ? vfs_write+0x34c/0x5d0 [ 1851.834761][T26115] FAULT_INJECTION: forcing a failure. [ 1851.834761][T26115] name failslab, interval 1, probability 0, space 0, times 0 [ 1851.838163][T26111] _do_fork+0x146/0xf60 [ 1851.838188][T26111] ? copy_init_mm+0x20/0x20 [ 1851.860064][T26111] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1851.865615][T26111] ? wait_for_completion+0x440/0x440 [ 1851.870921][T26111] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1851.877165][T26111] __x64_sys_clone+0x18d/0x250 [ 1851.881935][T26111] ? ksys_write+0x1cf/0x290 [ 1851.886444][T26111] ? __ia32_sys_vfork+0xc0/0xc0 [ 1851.891300][T26111] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1851.896589][T26111] ? trace_hardirqs_on+0x67/0x220 [ 1851.901614][T26111] do_syscall_64+0xfd/0x6a0 [ 1851.906122][T26111] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1851.912010][T26111] RIP: 0033:0x459829 [ 1851.915906][T26111] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1851.935513][T26111] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1851.943931][T26111] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1851.951913][T26111] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1851.959888][T26111] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1851.967866][T26111] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1851.975833][T26111] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1851.983823][T26115] CPU: 0 PID: 26115 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1851.991457][T26115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.001511][T26115] Call Trace: [ 1852.004811][T26115] dump_stack+0x16f/0x1f0 16:02:30 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="e03f03001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:30 executing program 3 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1852.009155][T26115] should_fail.cold+0xa/0x15 [ 1852.013756][T26115] ? fault_create_debugfs_attr+0x180/0x180 [ 1852.019745][T26115] __should_failslab+0x121/0x190 [ 1852.024824][T26115] should_failslab+0x9/0x14 [ 1852.029383][T26115] kmem_cache_alloc_node_trace+0x269/0x730 [ 1852.035241][T26115] __kmalloc_node+0x3d/0x70 [ 1852.039769][T26115] blk_mq_alloc_tag_set+0x346/0xd40 [ 1852.045002][T26115] loop_add+0x286/0x8d0 [ 1852.049176][T26115] ? idr_find+0x47/0x60 [ 1852.053468][T26115] loop_control_ioctl+0x165/0x360 [ 1852.058513][T26115] ? loop_add+0x8d0/0x8d0 [ 1852.062869][T26115] ? loop_add+0x8d0/0x8d0 [ 1852.067227][T26115] do_vfs_ioctl+0xdb6/0x13e0 [ 1852.072011][T26115] ? ioctl_preallocate+0x210/0x210 [ 1852.077139][T26115] ? __fget+0x388/0x560 [ 1852.081312][T26115] ? ksys_dup3+0x3e0/0x3e0 [ 1852.085734][T26115] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1852.091991][T26115] ? fput_many+0x12c/0x1a0 [ 1852.096419][T26115] ? tomoyo_file_ioctl+0x23/0x30 [ 1852.101369][T26115] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 16:02:30 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1852.107626][T26115] ? security_file_ioctl+0x8d/0xc0 [ 1852.112753][T26115] ksys_ioctl+0xab/0xd0 [ 1852.116948][T26115] __x64_sys_ioctl+0x73/0xb0 [ 1852.121562][T26115] do_syscall_64+0xfd/0x6a0 [ 1852.126084][T26115] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.132010][T26115] RIP: 0033:0x459829 [ 1852.135918][T26115] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:30 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="c00000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1852.155641][T26115] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1852.164060][T26115] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1852.172034][T26115] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1852.180010][T26115] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1852.188001][T26115] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1852.195985][T26115] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:31 executing program 5 (fault-call:4 fault-nth:5): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) [ 1852.389482][T26232] FAULT_INJECTION: forcing a failure. [ 1852.389482][T26232] name failslab, interval 1, probability 0, space 0, times 0 [ 1852.402373][T26232] CPU: 1 PID: 26232 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1852.410032][T26232] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.420101][T26232] Call Trace: [ 1852.423421][T26232] dump_stack+0x16f/0x1f0 [ 1852.427775][T26232] should_fail.cold+0xa/0x15 [ 1852.432396][T26232] ? fault_create_debugfs_attr+0x180/0x180 [ 1852.438237][T26232] __should_failslab+0x121/0x190 [ 1852.443194][T26232] should_failslab+0x9/0x14 [ 1852.447725][T26232] kmem_cache_alloc+0x298/0x700 [ 1852.452609][T26232] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.458897][T26232] ? __validate_process_creds+0x22d/0x380 [ 1852.464639][T26232] prepare_creds+0x3e/0x3f0 [ 1852.469155][T26232] copy_creds+0xa8/0x6f0 [ 1852.472969][T26238] FAULT_INJECTION: forcing a failure. [ 1852.472969][T26238] name failslab, interval 1, probability 0, space 0, times 0 [ 1852.473421][T26232] copy_process+0xdd7/0x6880 [ 1852.490586][T26232] ? get_pid_task+0xcb/0x190 [ 1852.495190][T26232] ? find_held_lock+0x35/0x130 [ 1852.499963][T26232] ? get_pid_task+0xcb/0x190 [ 1852.504580][T26232] ? __cleanup_sighand+0x60/0x60 [ 1852.509539][T26232] ? __f_unlock_pos+0x19/0x20 [ 1852.514421][T26232] ? lock_downgrade+0x920/0x920 [ 1852.519283][T26232] ? vfs_write+0x34c/0x5d0 [ 1852.523716][T26232] _do_fork+0x146/0xf60 [ 1852.527879][T26232] ? copy_init_mm+0x20/0x20 [ 1852.532390][T26232] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1852.537959][T26232] ? wait_for_completion+0x440/0x440 [ 1852.543256][T26232] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1852.549508][T26232] __x64_sys_clone+0x18d/0x250 [ 1852.554277][T26232] ? ksys_write+0x1cf/0x290 [ 1852.558787][T26232] ? __ia32_sys_vfork+0xc0/0xc0 [ 1852.563650][T26232] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1852.568939][T26232] ? trace_hardirqs_on+0x67/0x220 [ 1852.573978][T26232] do_syscall_64+0xfd/0x6a0 [ 1852.578489][T26232] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.584378][T26232] RIP: 0033:0x459829 [ 1852.588281][T26232] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1852.607892][T26232] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1852.616318][T26232] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1852.624299][T26232] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1852.632283][T26232] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 16:02:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="880400201400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1852.640274][T26232] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1852.648258][T26232] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1852.656263][T26238] CPU: 0 PID: 26238 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1852.663913][T26238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1852.673974][T26238] Call Trace: [ 1852.677274][T26238] dump_stack+0x16f/0x1f0 [ 1852.681622][T26238] should_fail.cold+0xa/0x15 16:02:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) [ 1852.686233][T26238] ? fault_create_debugfs_attr+0x180/0x180 [ 1852.692059][T26238] __should_failslab+0x121/0x190 [ 1852.697008][T26238] should_failslab+0x9/0x14 [ 1852.701522][T26238] kmem_cache_alloc_node_trace+0x269/0x730 [ 1852.707347][T26238] ? kasan_unpoison_shadow+0x35/0x50 [ 1852.712642][T26238] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1852.718459][T26238] __kmalloc_node+0x3d/0x70 [ 1852.722969][T26238] blk_mq_alloc_tag_set+0x492/0xd40 [ 1852.728182][T26238] loop_add+0x286/0x8d0 [ 1852.732347][T26238] ? idr_find+0x47/0x60 16:02:31 executing program 3 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1852.736517][T26238] loop_control_ioctl+0x165/0x360 [ 1852.741549][T26238] ? loop_add+0x8d0/0x8d0 [ 1852.747382][T26238] ? loop_add+0x8d0/0x8d0 [ 1852.751723][T26238] do_vfs_ioctl+0xdb6/0x13e0 [ 1852.756328][T26238] ? ioctl_preallocate+0x210/0x210 [ 1852.761470][T26238] ? __fget+0x388/0x560 [ 1852.765650][T26238] ? ksys_dup3+0x3e0/0x3e0 [ 1852.770080][T26238] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1852.776325][T26238] ? fput_many+0x12c/0x1a0 [ 1852.780802][T26238] ? tomoyo_file_ioctl+0x23/0x30 16:02:31 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="c00e00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1852.785865][T26238] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1852.794562][T26238] ? security_file_ioctl+0x8d/0xc0 [ 1852.799694][T26238] ksys_ioctl+0xab/0xd0 [ 1852.803863][T26238] __x64_sys_ioctl+0x73/0xb0 [ 1852.808470][T26238] do_syscall_64+0xfd/0x6a0 [ 1852.812990][T26238] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1852.818888][T26238] RIP: 0033:0x459829 [ 1852.822804][T26238] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:31 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(0xffffffffffffffff, 0x3a2) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:31 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r0}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) [ 1852.842416][T26238] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1852.850868][T26238] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1852.858851][T26238] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1852.866835][T26238] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1852.875447][T26238] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1852.883418][T26238] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:31 executing program 5 (fault-call:4 fault-nth:6): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1853.051380][T26359] FAULT_INJECTION: forcing a failure. [ 1853.051380][T26359] name failslab, interval 1, probability 0, space 0, times 0 [ 1853.064341][T26359] CPU: 1 PID: 26359 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1853.072903][T26359] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1853.082968][T26359] Call Trace: [ 1853.086275][T26359] dump_stack+0x16f/0x1f0 [ 1853.090618][T26359] should_fail.cold+0xa/0x15 [ 1853.095232][T26359] ? fault_create_debugfs_attr+0x180/0x180 [ 1853.101069][T26359] __should_failslab+0x121/0x190 [ 1853.106028][T26359] should_failslab+0x9/0x14 [ 1853.110558][T26359] __kmalloc+0x2ce/0x760 [ 1853.114818][T26359] ? refcount_inc_not_zero_checked+0x144/0x200 [ 1853.120998][T26359] ? refcount_dec_and_mutex_lock+0x90/0x90 [ 1853.126822][T26359] ? rcu_read_lock_sched_held+0x110/0x130 [ 1853.132560][T26359] ? security_prepare_creds+0x11d/0x190 [ 1853.138138][T26359] security_prepare_creds+0x11d/0x190 [ 1853.143550][T26359] prepare_creds+0x2f5/0x3f0 [ 1853.148166][T26359] copy_creds+0xa8/0x6f0 [ 1853.152439][T26359] copy_process+0xdd7/0x6880 [ 1853.157051][T26359] ? get_pid_task+0xcb/0x190 [ 1853.161649][T26359] ? find_held_lock+0x35/0x130 [ 1853.166426][T26359] ? get_pid_task+0xcb/0x190 [ 1853.171125][T26359] ? __cleanup_sighand+0x60/0x60 [ 1853.176071][T26359] ? __f_unlock_pos+0x19/0x20 [ 1853.180767][T26359] ? lock_downgrade+0x920/0x920 [ 1853.185712][T26359] ? vfs_write+0x34c/0x5d0 [ 1853.190143][T26359] _do_fork+0x146/0xf60 [ 1853.194313][T26359] ? copy_init_mm+0x20/0x20 [ 1853.198831][T26359] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1853.204409][T26359] ? wait_for_completion+0x440/0x440 [ 1853.209806][T26359] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1853.216063][T26359] __x64_sys_clone+0x18d/0x250 [ 1853.220834][T26359] ? ksys_write+0x1cf/0x290 [ 1853.225351][T26359] ? __ia32_sys_vfork+0xc0/0xc0 [ 1853.230225][T26359] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1853.235537][T26359] ? trace_hardirqs_on+0x67/0x220 [ 1853.240575][T26359] do_syscall_64+0xfd/0x6a0 [ 1853.245090][T26359] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.250979][T26359] RIP: 0033:0x459829 [ 1853.254874][T26359] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1853.274485][T26359] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1853.282910][T26359] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1853.290892][T26359] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 16:02:31 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:31 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="00f0ff7f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:32 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="effd00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="effdffff1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1853.298872][T26359] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1853.306856][T26359] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1853.314833][T26359] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:32 executing program 3 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1853.482908][T26467] FAULT_INJECTION: forcing a failure. [ 1853.482908][T26467] name failslab, interval 1, probability 0, space 0, times 0 [ 1853.495938][T26467] CPU: 0 PID: 26467 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1853.503589][T26467] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1853.513741][T26467] Call Trace: [ 1853.517067][T26467] dump_stack+0x16f/0x1f0 [ 1853.521436][T26467] should_fail.cold+0xa/0x15 [ 1853.526066][T26467] ? fault_create_debugfs_attr+0x180/0x180 [ 1853.531950][T26467] __should_failslab+0x121/0x190 [ 1853.536924][T26467] should_failslab+0x9/0x14 [ 1853.539424][T26473] FAULT_INJECTION: forcing a failure. [ 1853.539424][T26473] name failslab, interval 1, probability 0, space 0, times 0 [ 1853.541455][T26467] kmem_cache_alloc_node_trace+0x269/0x730 [ 1853.541484][T26467] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1853.541522][T26467] ? find_next_bit+0x107/0x130 [ 1853.571056][T26467] blk_mq_init_tags+0x73/0x2c0 [ 1853.575825][T26467] blk_mq_alloc_rq_map+0x88/0x200 [ 1853.580851][T26467] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1853.586047][T26467] ? kasan_kmalloc+0x9/0x10 [ 1853.590558][T26467] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1853.595795][T26467] loop_add+0x286/0x8d0 [ 1853.599949][T26467] ? idr_find+0x47/0x60 [ 1853.604115][T26467] loop_control_ioctl+0x165/0x360 [ 1853.609136][T26467] ? loop_add+0x8d0/0x8d0 [ 1853.613480][T26467] ? loop_add+0x8d0/0x8d0 [ 1853.617811][T26467] do_vfs_ioctl+0xdb6/0x13e0 [ 1853.622420][T26467] ? ioctl_preallocate+0x210/0x210 [ 1853.627528][T26467] ? __fget+0x388/0x560 [ 1853.631683][T26467] ? ksys_dup3+0x3e0/0x3e0 [ 1853.636102][T26467] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1853.642340][T26467] ? fput_many+0x12c/0x1a0 [ 1853.646777][T26467] ? tomoyo_file_ioctl+0x23/0x30 [ 1853.651714][T26467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.657956][T26467] ? security_file_ioctl+0x8d/0xc0 [ 1853.663070][T26467] ksys_ioctl+0xab/0xd0 [ 1853.667232][T26467] __x64_sys_ioctl+0x73/0xb0 [ 1853.671826][T26467] do_syscall_64+0xfd/0x6a0 [ 1853.676375][T26467] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.682283][T26467] RIP: 0033:0x459829 [ 1853.686191][T26467] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1853.706491][T26467] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1853.714916][T26467] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1853.722890][T26467] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1853.730872][T26467] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1853.738852][T26467] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1853.746824][T26467] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1853.754835][T26473] CPU: 1 PID: 26473 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1853.755053][T26467] blk-mq: reduced tag depth (128 -> 64) [ 1853.762474][T26473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1853.762480][T26473] Call Trace: [ 1853.762503][T26473] dump_stack+0x16f/0x1f0 [ 1853.762523][T26473] should_fail.cold+0xa/0x15 [ 1853.762544][T26473] ? fault_create_debugfs_attr+0x180/0x180 [ 1853.778161][T26473] __should_failslab+0x121/0x190 [ 1853.778179][T26473] should_failslab+0x9/0x14 [ 1853.778191][T26473] kmem_cache_alloc+0x298/0x700 [ 1853.778215][T26473] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1853.785802][T26473] __delayacct_tsk_init+0x20/0x80 [ 1853.785819][T26473] copy_process+0x456b/0x6880 [ 1853.785837][T26473] ? get_pid_task+0xcb/0x190 [ 1853.796300][T26473] ? find_held_lock+0x35/0x130 [ 1853.796314][T26473] ? get_pid_task+0xcb/0x190 [ 1853.796335][T26473] ? __cleanup_sighand+0x60/0x60 [ 1853.796354][T26473] ? __f_unlock_pos+0x19/0x20 [ 1853.805767][T26473] ? lock_downgrade+0x920/0x920 [ 1853.805782][T26473] ? vfs_write+0x34c/0x5d0 [ 1853.805802][T26473] _do_fork+0x146/0xf60 [ 1853.805821][T26473] ? copy_init_mm+0x20/0x20 [ 1853.868213][T26473] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1853.873774][T26473] ? wait_for_completion+0x440/0x440 16:02:32 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1853.879068][T26473] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1853.885321][T26473] __x64_sys_clone+0x18d/0x250 [ 1853.890094][T26473] ? ksys_write+0x1cf/0x290 [ 1853.894601][T26473] ? __ia32_sys_vfork+0xc0/0xc0 [ 1853.894627][T26473] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1853.894649][T26473] ? trace_hardirqs_on+0x67/0x220 [ 1853.904782][T26473] do_syscall_64+0xfd/0x6a0 [ 1853.904804][T26473] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1853.904816][T26473] RIP: 0033:0x459829 16:02:32 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000000f00190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1853.904835][T26473] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1853.914320][T26473] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1853.914334][T26473] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1853.914342][T26473] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1853.914350][T26473] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1853.914358][T26473] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:32 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1853.914373][T26473] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:33 executing program 5 (fault-call:4 fault-nth:7): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:33 executing program 3 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="e03f03001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001200190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1854.293695][T26678] FAULT_INJECTION: forcing a failure. [ 1854.293695][T26678] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.306830][T26678] CPU: 0 PID: 26678 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1854.314495][T26678] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1854.324658][T26678] Call Trace: [ 1854.327978][T26678] dump_stack+0x16f/0x1f0 [ 1854.332337][T26678] should_fail.cold+0xa/0x15 [ 1854.336953][T26678] ? fault_create_debugfs_attr+0x180/0x180 [ 1854.342779][T26678] __should_failslab+0x121/0x190 [ 1854.342822][T26678] should_failslab+0x9/0x14 [ 1854.342839][T26678] kmem_cache_alloc_trace+0x2c3/0x770 [ 1854.342865][T26678] ? mark_held_locks+0xa4/0xf0 [ 1854.342895][T26678] alloc_perf_context+0x49/0xf0 [ 1854.352324][T26678] inherit_task_group.isra.0.part.0+0x112/0x2c0 [ 1854.352343][T26678] perf_event_init_task+0x3f5/0x7a0 [ 1854.352362][T26678] ? perf_event_attrs+0x40/0x40 [ 1854.352375][T26678] ? sched_fork+0x3cf/0x900 [ 1854.352390][T26678] ? lockdep_init_map+0x1be/0x6d0 16:02:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1854.352411][T26678] copy_process+0x196a/0x6880 [ 1854.362513][T26678] ? get_pid_task+0xcb/0x190 [ 1854.362537][T26678] ? __cleanup_sighand+0x60/0x60 [ 1854.362550][T26678] ? __f_unlock_pos+0x19/0x20 [ 1854.362570][T26678] ? lock_downgrade+0x920/0x920 [ 1854.362590][T26678] ? vfs_write+0x34c/0x5d0 [ 1854.373652][T26678] _do_fork+0x146/0xf60 [ 1854.373669][T26678] ? copy_init_mm+0x20/0x20 [ 1854.373682][T26678] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1854.373700][T26678] ? wait_for_completion+0x440/0x440 [ 1854.373722][T26678] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1854.383752][T26678] __x64_sys_clone+0x18d/0x250 [ 1854.383766][T26678] ? ksys_write+0x1cf/0x290 [ 1854.383780][T26678] ? __ia32_sys_vfork+0xc0/0xc0 [ 1854.383801][T26678] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1854.383818][T26678] ? trace_hardirqs_on+0x67/0x220 [ 1854.383839][T26678] do_syscall_64+0xfd/0x6a0 [ 1854.475924][T26678] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1854.481825][T26678] RIP: 0033:0x459829 16:02:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="880400201400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1854.485726][T26678] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1854.505336][T26678] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1854.513757][T26678] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1854.521732][T26678] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1854.529743][T26678] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 16:02:33 executing program 3 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1854.537810][T26678] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1854.546663][T26678] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1854.639825][T26702] FAULT_INJECTION: forcing a failure. [ 1854.639825][T26702] name failslab, interval 1, probability 0, space 0, times 0 [ 1854.652576][T26702] CPU: 1 PID: 26702 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1854.660244][T26702] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1854.670309][T26702] Call Trace: [ 1854.673622][T26702] dump_stack+0x16f/0x1f0 [ 1854.677973][T26702] should_fail.cold+0xa/0x15 [ 1854.682578][T26702] ? fault_create_debugfs_attr+0x180/0x180 [ 1854.688427][T26702] __should_failslab+0x121/0x190 [ 1854.693385][T26702] should_failslab+0x9/0x14 [ 1854.697929][T26702] kmem_cache_alloc_node_trace+0x269/0x730 [ 1854.703759][T26702] ? mark_lock+0xc0/0x11e0 [ 1854.708195][T26702] __kmalloc_node+0x3d/0x70 [ 1854.712715][T26702] sbitmap_init_node+0x29e/0x510 [ 1854.717681][T26702] sbitmap_queue_init_node+0x40/0x710 [ 1854.723069][T26702] ? find_next_bit+0x107/0x130 [ 1854.727855][T26702] blk_mq_init_tags+0x119/0x2c0 [ 1854.732720][T26702] blk_mq_alloc_rq_map+0x88/0x200 [ 1854.737765][T26702] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1854.743569][T26702] ? kasan_kmalloc+0x9/0x10 [ 1854.748079][T26702] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1854.753301][T26702] loop_add+0x286/0x8d0 [ 1854.757476][T26702] ? idr_find+0x47/0x60 [ 1854.766516][T26702] loop_control_ioctl+0x165/0x360 [ 1854.771655][T26702] ? loop_add+0x8d0/0x8d0 [ 1854.776007][T26702] ? loop_add+0x8d0/0x8d0 [ 1854.780352][T26702] do_vfs_ioctl+0xdb6/0x13e0 [ 1854.784968][T26702] ? ioctl_preallocate+0x210/0x210 [ 1854.790097][T26702] ? __fget+0x388/0x560 [ 1854.794276][T26702] ? ksys_dup3+0x3e0/0x3e0 [ 1854.798713][T26702] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1854.804968][T26702] ? fput_many+0x12c/0x1a0 [ 1854.809413][T26702] ? tomoyo_file_ioctl+0x23/0x30 [ 1854.814365][T26702] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1854.820618][T26702] ? security_file_ioctl+0x8d/0xc0 [ 1854.825741][T26702] ksys_ioctl+0xab/0xd0 [ 1854.829914][T26702] __x64_sys_ioctl+0x73/0xb0 [ 1854.834517][T26702] do_syscall_64+0xfd/0x6a0 16:02:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1854.839036][T26702] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1854.844938][T26702] RIP: 0033:0x459829 [ 1854.848834][T26702] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1854.868455][T26702] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1854.877332][T26702] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1854.885301][T26702] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1854.893314][T26702] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1854.903638][T26702] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1854.911615][T26702] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1854.920023][T26702] blk-mq: reduced tag depth (128 -> 64) 16:02:33 executing program 5 (fault-call:4 fault-nth:8): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:33 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:33 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="00f0ff7f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480200001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1855.074566][T26921] FAULT_INJECTION: forcing a failure. [ 1855.074566][T26921] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.087430][T26921] CPU: 1 PID: 26921 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1855.095069][T26921] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.105133][T26921] Call Trace: [ 1855.108452][T26921] dump_stack+0x16f/0x1f0 [ 1855.112811][T26921] should_fail.cold+0xa/0x15 [ 1855.117427][T26921] ? fault_create_debugfs_attr+0x180/0x180 16:02:33 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480400001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1855.123270][T26921] __should_failslab+0x121/0x190 [ 1855.128316][T26921] should_failslab+0x9/0x14 [ 1855.132833][T26921] kmem_cache_alloc_trace+0x2c3/0x770 [ 1855.138246][T26921] ? perf_lock_task_context+0x1ab/0x8b0 [ 1855.143820][T26921] ? fs_reclaim_acquire.part.0+0x30/0x30 [ 1855.149477][T26921] perf_event_alloc.part.0+0xbf/0x31f0 [ 1855.154949][T26921] ? __kasan_check_read+0x11/0x20 [ 1855.160072][T26921] ? mark_lock+0xc0/0x11e0 [ 1855.164502][T26921] ? perf_swevent_init+0x590/0x590 [ 1855.169644][T26921] inherit_event.isra.0+0x1c5/0xa30 [ 1855.174866][T26921] ? perf_event_create_kernel_counter+0x3f0/0x3f0 [ 1855.181301][T26921] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1855.187562][T26921] ? refcount_inc_checked+0x2b/0x70 [ 1855.192793][T26921] inherit_task_group.isra.0.part.0+0x75/0x2c0 [ 1855.198967][T26921] perf_event_init_task+0x3f5/0x7a0 [ 1855.198995][T26921] ? perf_event_attrs+0x40/0x40 [ 1855.209014][T26921] ? sched_fork+0x3cf/0x900 [ 1855.213542][T26921] ? lockdep_init_map+0x1be/0x6d0 [ 1855.213563][T26921] copy_process+0x196a/0x6880 [ 1855.213576][T26921] ? get_pid_task+0xcb/0x190 [ 1855.213601][T26921] ? __cleanup_sighand+0x60/0x60 [ 1855.213620][T26921] ? __f_unlock_pos+0x19/0x20 [ 1855.223298][T26921] ? lock_downgrade+0x920/0x920 [ 1855.223312][T26921] ? vfs_write+0x34c/0x5d0 [ 1855.223331][T26921] _do_fork+0x146/0xf60 [ 1855.223349][T26921] ? copy_init_mm+0x20/0x20 [ 1855.232850][T26921] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1855.232868][T26921] ? wait_for_completion+0x440/0x440 [ 1855.232892][T26921] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 16:02:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480a00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1855.272462][T26921] __x64_sys_clone+0x18d/0x250 [ 1855.277247][T26921] ? ksys_write+0x1cf/0x290 [ 1855.281772][T26921] ? __ia32_sys_vfork+0xc0/0xc0 [ 1855.286644][T26921] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1855.291972][T26921] ? trace_hardirqs_on+0x67/0x220 [ 1855.297011][T26921] do_syscall_64+0xfd/0x6a0 [ 1855.301536][T26921] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.307778][T26921] RIP: 0033:0x459829 16:02:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="effdffff1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1855.311679][T26921] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1855.331293][T26921] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1855.339718][T26921] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1855.347932][T26921] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1855.355915][T26921] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1855.363936][T26921] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1855.371934][T26921] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:34 executing program 3 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1855.450315][T27019] FAULT_INJECTION: forcing a failure. [ 1855.450315][T27019] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.463250][T27019] CPU: 0 PID: 27019 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1855.470887][T27019] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.480958][T27019] Call Trace: [ 1855.484262][T27019] dump_stack+0x16f/0x1f0 [ 1855.488605][T27019] should_fail.cold+0xa/0x15 [ 1855.493223][T27019] ? fault_create_debugfs_attr+0x180/0x180 [ 1855.499058][T27019] __should_failslab+0x121/0x190 [ 1855.504012][T27019] should_failslab+0x9/0x14 [ 1855.508618][T27019] kmem_cache_alloc_node_trace+0x269/0x730 [ 1855.514531][T27019] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1855.520262][T27019] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1855.525993][T27019] ? find_next_bit+0x107/0x130 [ 1855.530769][T27019] sbitmap_queue_init_node+0x29e/0x710 [ 1855.536255][T27019] blk_mq_init_tags+0x119/0x2c0 [ 1855.541183][T27019] blk_mq_alloc_rq_map+0x88/0x200 [ 1855.546335][T27019] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1855.551540][T27019] ? kasan_kmalloc+0x9/0x10 [ 1855.556150][T27019] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1855.561376][T27019] loop_add+0x286/0x8d0 [ 1855.565545][T27019] ? idr_find+0x47/0x60 [ 1855.569717][T27019] loop_control_ioctl+0x165/0x360 [ 1855.574754][T27019] ? loop_add+0x8d0/0x8d0 [ 1855.579097][T27019] ? loop_add+0x8d0/0x8d0 [ 1855.583439][T27019] do_vfs_ioctl+0xdb6/0x13e0 [ 1855.588040][T27019] ? ioctl_preallocate+0x210/0x210 [ 1855.593182][T27019] ? __fget+0x388/0x560 16:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1855.597357][T27019] ? ksys_dup3+0x3e0/0x3e0 [ 1855.601785][T27019] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1855.608129][T27019] ? fput_many+0x12c/0x1a0 [ 1855.612561][T27019] ? tomoyo_file_ioctl+0x23/0x30 [ 1855.617499][T27019] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1855.623752][T27019] ? security_file_ioctl+0x8d/0xc0 [ 1855.628868][T27019] ksys_ioctl+0xab/0xd0 [ 1855.633045][T27019] __x64_sys_ioctl+0x73/0xb0 [ 1855.637652][T27019] do_syscall_64+0xfd/0x6a0 [ 1855.642178][T27019] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.648072][T27019] RIP: 0033:0x459829 [ 1855.651977][T27019] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1855.671586][T27019] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1855.680014][T27019] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1855.687985][T27019] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1855.695940][T27019] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1855.703920][T27019] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1855.711914][T27019] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1855.720279][T27019] blk-mq: reduced tag depth (128 -> 64) [ 1855.811307][T27050] FAULT_INJECTION: forcing a failure. [ 1855.811307][T27050] name failslab, interval 1, probability 0, space 0, times 0 [ 1855.824496][T27050] CPU: 0 PID: 27050 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1855.832169][T27050] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1855.842327][T27050] Call Trace: [ 1855.845643][T27050] dump_stack+0x16f/0x1f0 [ 1855.850001][T27050] should_fail.cold+0xa/0x15 [ 1855.854611][T27050] ? fault_create_debugfs_attr+0x180/0x180 [ 1855.860457][T27050] __should_failslab+0x121/0x190 [ 1855.865422][T27050] should_failslab+0x9/0x14 [ 1855.869945][T27050] __kmalloc+0x2ce/0x760 [ 1855.874212][T27050] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1855.880502][T27050] ? audit_alloc+0xae/0x770 [ 1855.885048][T27050] ? security_task_alloc+0x111/0x180 [ 1855.890363][T27050] security_task_alloc+0x111/0x180 [ 1855.895525][T27050] copy_process+0x1a07/0x6880 [ 1855.900249][T27050] ? get_pid_task+0xcb/0x190 [ 1855.904957][T27050] ? __cleanup_sighand+0x60/0x60 [ 1855.909918][T27050] ? __f_unlock_pos+0x19/0x20 [ 1855.914630][T27050] ? lock_downgrade+0x920/0x920 [ 1855.919500][T27050] ? vfs_write+0x34c/0x5d0 [ 1855.923943][T27050] _do_fork+0x146/0xf60 [ 1855.928121][T27050] ? copy_init_mm+0x20/0x20 [ 1855.932643][T27050] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1855.938204][T27050] ? wait_for_completion+0x440/0x440 [ 1855.943518][T27050] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1855.949796][T27050] __x64_sys_clone+0x18d/0x250 [ 1855.954669][T27050] ? ksys_write+0x1cf/0x290 16:02:34 executing program 5 (fault-call:4 fault-nth:9): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480e00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1855.959203][T27050] ? __ia32_sys_vfork+0xc0/0xc0 [ 1855.964087][T27050] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1855.969394][T27050] ? trace_hardirqs_on+0x67/0x220 [ 1855.974443][T27050] do_syscall_64+0xfd/0x6a0 [ 1855.978974][T27050] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1855.984876][T27050] RIP: 0033:0x459829 [ 1855.988786][T27050] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:34 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1856.008399][T27050] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1856.016825][T27050] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1856.024838][T27050] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1856.032849][T27050] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1856.040959][T27050] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1856.048950][T27050] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:34 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000000f00190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:34 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:34 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480f00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1856.265607][T27169] FAULT_INJECTION: forcing a failure. [ 1856.265607][T27169] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.278608][T27169] CPU: 1 PID: 27169 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1856.286256][T27169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1856.296317][T27169] Call Trace: [ 1856.299631][T27169] dump_stack+0x16f/0x1f0 [ 1856.304009][T27169] should_fail.cold+0xa/0x15 [ 1856.308624][T27169] ? fault_create_debugfs_attr+0x180/0x180 [ 1856.314463][T27169] __should_failslab+0x121/0x190 [ 1856.319424][T27169] should_failslab+0x9/0x14 [ 1856.323948][T27169] kmem_cache_alloc_node_trace+0x269/0x730 [ 1856.329774][T27169] ? lockdep_init_map+0x1be/0x6d0 [ 1856.334827][T27169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.341094][T27169] ? sbitmap_init_node+0x149/0x510 [ 1856.346231][T27169] sbitmap_queue_init_node+0x29e/0x710 [ 1856.351718][T27169] blk_mq_init_tags+0x17b/0x2c0 [ 1856.356597][T27169] blk_mq_alloc_rq_map+0x88/0x200 [ 1856.361640][T27169] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1856.367114][T27169] ? kasan_kmalloc+0x9/0x10 [ 1856.371639][T27169] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1856.376864][T27169] loop_add+0x286/0x8d0 [ 1856.381036][T27169] ? idr_find+0x47/0x60 [ 1856.385304][T27169] loop_control_ioctl+0x165/0x360 [ 1856.390365][T27169] ? loop_add+0x8d0/0x8d0 [ 1856.394732][T27169] ? loop_add+0x8d0/0x8d0 [ 1856.399173][T27169] do_vfs_ioctl+0xdb6/0x13e0 [ 1856.403811][T27169] ? ioctl_preallocate+0x210/0x210 [ 1856.408937][T27169] ? __fget+0x388/0x560 16:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:35 executing program 3 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001200190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1856.413905][T27169] ? ksys_dup3+0x3e0/0x3e0 [ 1856.418434][T27169] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1856.424700][T27169] ? fput_many+0x12c/0x1a0 [ 1856.429135][T27169] ? tomoyo_file_ioctl+0x23/0x30 [ 1856.434091][T27169] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1856.440346][T27169] ? security_file_ioctl+0x8d/0xc0 [ 1856.445497][T27169] ksys_ioctl+0xab/0xd0 [ 1856.449742][T27169] __x64_sys_ioctl+0x73/0xb0 [ 1856.454349][T27169] do_syscall_64+0xfd/0x6a0 [ 1856.458875][T27169] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1856.464806][T27169] RIP: 0033:0x459829 [ 1856.468708][T27169] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1856.488353][T27169] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1856.496782][T27169] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1856.504798][T27169] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1856.512785][T27169] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1856.520775][T27169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1856.528753][T27169] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1856.537035][T27169] blk-mq: reduced tag depth (128 -> 64) 16:02:35 executing program 5 (fault-call:4 fault-nth:10): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="486000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1856.748389][T27297] FAULT_INJECTION: forcing a failure. [ 1856.748389][T27297] name failslab, interval 1, probability 0, space 0, times 0 [ 1856.769994][T27297] CPU: 0 PID: 27297 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1856.777644][T27297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1856.787708][T27297] Call Trace: [ 1856.791015][T27297] dump_stack+0x16f/0x1f0 [ 1856.795366][T27297] should_fail.cold+0xa/0x15 [ 1856.799975][T27297] ? fault_create_debugfs_attr+0x180/0x180 [ 1856.805819][T27297] __should_failslab+0x121/0x190 [ 1856.810772][T27297] should_failslab+0x9/0x14 [ 1856.815295][T27297] __kmalloc+0x2ce/0x760 [ 1856.819568][T27297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1856.825860][T27297] ? audit_alloc+0xae/0x770 [ 1856.830382][T27297] ? security_task_alloc+0x111/0x180 [ 1856.835688][T27297] security_task_alloc+0x111/0x180 [ 1856.840818][T27297] copy_process+0x1a07/0x6880 [ 1856.845514][T27297] ? get_pid_task+0xcb/0x190 [ 1856.845545][T27297] ? __cleanup_sighand+0x60/0x60 [ 1856.845557][T27297] ? __f_unlock_pos+0x19/0x20 [ 1856.845583][T27297] ? lock_downgrade+0x920/0x920 [ 1856.845603][T27297] ? vfs_write+0x34c/0x5d0 [ 1856.845634][T27297] _do_fork+0x146/0xf60 [ 1856.845656][T27297] ? copy_init_mm+0x20/0x20 [ 1856.878361][T27297] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1856.884007][T27297] ? wait_for_completion+0x440/0x440 [ 1856.889311][T27297] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1856.895672][T27297] __x64_sys_clone+0x18d/0x250 [ 1856.900450][T27297] ? ksys_write+0x1cf/0x290 [ 1856.904983][T27297] ? __ia32_sys_vfork+0xc0/0xc0 [ 1856.909856][T27297] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1856.915169][T27297] ? trace_hardirqs_on+0x67/0x220 [ 1856.920216][T27297] do_syscall_64+0xfd/0x6a0 [ 1856.924737][T27297] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1856.930639][T27297] RIP: 0033:0x459829 16:02:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48f000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x0, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:35 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1856.930659][T27297] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1856.954261][T27297] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1856.962787][T27297] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1856.970864][T27297] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1856.978857][T27297] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1856.986935][T27297] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:35 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1856.994932][T27297] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:35 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000a001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:35 executing program 3 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1857.162165][T27402] FAULT_INJECTION: forcing a failure. [ 1857.162165][T27402] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.174920][T27402] CPU: 1 PID: 27402 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1857.182580][T27402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1857.192652][T27402] Call Trace: [ 1857.195964][T27402] dump_stack+0x16f/0x1f0 [ 1857.200316][T27402] should_fail.cold+0xa/0x15 [ 1857.204968][T27402] ? fault_create_debugfs_attr+0x180/0x180 [ 1857.210810][T27402] __should_failslab+0x121/0x190 [ 1857.215768][T27402] should_failslab+0x9/0x14 [ 1857.220291][T27402] kmem_cache_alloc_node_trace+0x269/0x730 [ 1857.226107][T27402] ? sbitmap_queue_init_node+0x57/0x710 [ 1857.231685][T27402] __kmalloc_node+0x3d/0x70 [ 1857.236207][T27402] blk_mq_alloc_rq_map+0xb9/0x200 [ 1857.241255][T27402] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1857.246473][T27402] ? kasan_kmalloc+0x9/0x10 [ 1857.251001][T27402] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1857.256236][T27402] loop_add+0x286/0x8d0 16:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) [ 1857.260495][T27402] ? idr_find+0x47/0x60 [ 1857.264668][T27402] loop_control_ioctl+0x165/0x360 [ 1857.269816][T27402] ? loop_add+0x8d0/0x8d0 [ 1857.274164][T27402] ? loop_add+0x8d0/0x8d0 [ 1857.278546][T27402] do_vfs_ioctl+0xdb6/0x13e0 [ 1857.283153][T27402] ? ioctl_preallocate+0x210/0x210 [ 1857.288275][T27402] ? __fget+0x388/0x560 [ 1857.292459][T27402] ? ksys_dup3+0x3e0/0x3e0 [ 1857.296900][T27402] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1857.303162][T27402] ? fput_many+0x12c/0x1a0 [ 1857.307682][T27402] ? tomoyo_file_ioctl+0x23/0x30 [ 1857.312635][T27402] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1857.318899][T27402] ? security_file_ioctl+0x8d/0xc0 [ 1857.324037][T27402] ksys_ioctl+0xab/0xd0 [ 1857.328209][T27402] __x64_sys_ioctl+0x73/0xb0 [ 1857.332819][T27402] do_syscall_64+0xfd/0x6a0 [ 1857.337335][T27402] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1857.343218][T27402] RIP: 0033:0x459829 [ 1857.347120][T27402] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1857.366823][T27402] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1857.375251][T27402] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1857.383238][T27402] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1857.391218][T27402] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1857.399209][T27402] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1857.407377][T27402] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1857.415759][T27402] blk-mq: reduced tag depth (128 -> 64) 16:02:36 executing program 5 (fault-call:4 fault-nth:11): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480200001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1857.566278][T27520] FAULT_INJECTION: forcing a failure. [ 1857.566278][T27520] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.579080][T27520] CPU: 0 PID: 27520 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1857.586728][T27520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1857.596834][T27520] Call Trace: [ 1857.600163][T27520] dump_stack+0x16f/0x1f0 [ 1857.604524][T27520] should_fail.cold+0xa/0x15 [ 1857.609148][T27520] ? fault_create_debugfs_attr+0x180/0x180 [ 1857.614982][T27520] __should_failslab+0x121/0x190 [ 1857.619957][T27520] should_failslab+0x9/0x14 [ 1857.624478][T27520] kmem_cache_alloc_trace+0x2c3/0x770 [ 1857.629871][T27520] ? lock_downgrade+0x920/0x920 [ 1857.634747][T27520] ? rwlock_bug.part.0+0x90/0x90 [ 1857.639724][T27520] alloc_fdtable+0x86/0x290 [ 1857.644243][T27520] dup_fd+0x782/0xb70 [ 1857.644278][T27520] copy_process+0x1abc/0x6880 [ 1857.644301][T27520] ? get_pid_task+0xcb/0x190 [ 1857.652953][T27520] ? __cleanup_sighand+0x60/0x60 [ 1857.652966][T27520] ? __f_unlock_pos+0x19/0x20 [ 1857.652986][T27520] ? lock_downgrade+0x920/0x920 [ 1857.653000][T27520] ? vfs_write+0x34c/0x5d0 [ 1857.653029][T27520] _do_fork+0x146/0xf60 [ 1857.653051][T27520] ? copy_init_mm+0x20/0x20 [ 1857.685157][T27520] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1857.690715][T27520] ? wait_for_completion+0x440/0x440 [ 1857.696014][T27520] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1857.702271][T27520] __x64_sys_clone+0x18d/0x250 [ 1857.707042][T27520] ? ksys_write+0x1cf/0x290 [ 1857.711558][T27520] ? __ia32_sys_vfork+0xc0/0xc0 [ 1857.716430][T27520] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1857.721737][T27520] ? trace_hardirqs_on+0x67/0x220 [ 1857.726776][T27520] do_syscall_64+0xfd/0x6a0 [ 1857.731296][T27520] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1857.737189][T27520] RIP: 0033:0x459829 [ 1857.741096][T27520] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(0x0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, r1}}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r2 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r2, 0x0, 0x800000bf) 16:02:36 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48c00e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1857.760723][T27520] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1857.769156][T27520] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1857.777136][T27520] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1857.785115][T27520] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1857.793125][T27520] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1857.801111][T27520] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1857.891521][T27615] FAULT_INJECTION: forcing a failure. [ 1857.891521][T27615] name failslab, interval 1, probability 0, space 0, times 0 [ 1857.904241][T27615] CPU: 0 PID: 27615 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1857.911972][T27615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1857.922061][T27615] Call Trace: [ 1857.925402][T27615] dump_stack+0x16f/0x1f0 [ 1857.929782][T27615] should_fail.cold+0xa/0x15 [ 1857.934424][T27615] ? fault_create_debugfs_attr+0x180/0x180 [ 1857.940278][T27615] __should_failslab+0x121/0x190 [ 1857.945233][T27615] should_failslab+0x9/0x14 [ 1857.949755][T27615] kmem_cache_alloc_node_trace+0x269/0x730 [ 1857.955585][T27615] ? kasan_unpoison_shadow+0x35/0x50 [ 1857.960891][T27615] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1857.966754][T27615] __kmalloc_node+0x3d/0x70 [ 1857.971400][T27615] blk_mq_alloc_rq_map+0xfa/0x200 [ 1857.976501][T27615] __blk_mq_alloc_rq_map+0xb1/0x2e0 [ 1857.982569][T27615] ? kasan_kmalloc+0x9/0x10 [ 1857.987120][T27615] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1857.992342][T27615] loop_add+0x286/0x8d0 [ 1857.996512][T27615] ? idr_find+0x47/0x60 [ 1858.000699][T27615] loop_control_ioctl+0x165/0x360 [ 1858.005743][T27615] ? loop_add+0x8d0/0x8d0 [ 1858.010093][T27615] ? loop_add+0x8d0/0x8d0 [ 1858.014440][T27615] do_vfs_ioctl+0xdb6/0x13e0 [ 1858.019050][T27615] ? ioctl_preallocate+0x210/0x210 [ 1858.024178][T27615] ? __fget+0x388/0x560 [ 1858.028353][T27615] ? ksys_dup3+0x3e0/0x3e0 [ 1858.032782][T27615] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1858.039033][T27615] ? fput_many+0x12c/0x1a0 [ 1858.043467][T27615] ? tomoyo_file_ioctl+0x23/0x30 [ 1858.048418][T27615] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1858.054670][T27615] ? security_file_ioctl+0x8d/0xc0 [ 1858.059825][T27615] ksys_ioctl+0xab/0xd0 [ 1858.064012][T27615] __x64_sys_ioctl+0x73/0xb0 [ 1858.068616][T27615] do_syscall_64+0xfd/0x6a0 [ 1858.073139][T27615] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1858.079043][T27615] RIP: 0033:0x459829 16:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:36 executing program 3 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:36 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:36 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:36 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480400001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1858.082950][T27615] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1858.102594][T27615] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1858.111026][T27615] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1858.119017][T27615] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1858.127018][T27615] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1858.134997][T27615] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1858.142971][T27615] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1858.153005][T27615] blk-mq: reduced tag depth (128 -> 64) 16:02:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000f001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:37 executing program 5 (fault-call:4 fault-nth:12): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1858.386809][T27651] FAULT_INJECTION: forcing a failure. [ 1858.386809][T27651] name failslab, interval 1, probability 0, space 0, times 0 [ 1858.399774][T27651] CPU: 1 PID: 27651 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1858.407424][T27651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1858.417485][T27651] Call Trace: [ 1858.420801][T27651] dump_stack+0x16f/0x1f0 [ 1858.425175][T27651] should_fail.cold+0xa/0x15 [ 1858.429781][T27651] ? fault_create_debugfs_attr+0x180/0x180 [ 1858.435617][T27651] __should_failslab+0x121/0x190 [ 1858.440581][T27651] should_failslab+0x9/0x14 [ 1858.445103][T27651] kmem_cache_alloc_node_trace+0x269/0x730 [ 1858.450929][T27651] ? alloc_fdtable+0x86/0x290 [ 1858.455625][T27651] __kmalloc_node+0x3d/0x70 [ 1858.460233][T27651] kvmalloc_node+0x68/0x100 [ 1858.464778][T27651] alloc_fdtable+0xd6/0x290 [ 1858.469295][T27651] dup_fd+0x782/0xb70 [ 1858.473302][T27651] copy_process+0x1abc/0x6880 [ 1858.477991][T27651] ? get_pid_task+0xcb/0x190 [ 1858.482613][T27651] ? __cleanup_sighand+0x60/0x60 [ 1858.487685][T27651] ? __f_unlock_pos+0x19/0x20 [ 1858.492435][T27651] ? lock_downgrade+0x920/0x920 [ 1858.497302][T27651] ? vfs_write+0x34c/0x5d0 [ 1858.502004][T27651] _do_fork+0x146/0xf60 [ 1858.506192][T27651] ? copy_init_mm+0x20/0x20 [ 1858.510715][T27651] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1858.516276][T27651] ? wait_for_completion+0x440/0x440 [ 1858.516306][T27651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1858.516332][T27651] __x64_sys_clone+0x18d/0x250 [ 1858.527835][T27651] ? ksys_write+0x1cf/0x290 [ 1858.527852][T27651] ? __ia32_sys_vfork+0xc0/0xc0 [ 1858.527875][T27651] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1858.527897][T27651] ? trace_hardirqs_on+0x67/0x220 [ 1858.537168][T27651] do_syscall_64+0xfd/0x6a0 [ 1858.547272][T27651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1858.556752][T27651] RIP: 0033:0x459829 [ 1858.566508][T27651] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0xffffffffffffffff, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1858.586140][T27651] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1858.594569][T27651] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1858.602562][T27651] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1858.610541][T27651] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1858.618520][T27651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1858.626497][T27651] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1858.675945][T27665] FAULT_INJECTION: forcing a failure. [ 1858.675945][T27665] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1858.689382][T27665] CPU: 0 PID: 27665 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1858.697022][T27665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1858.707087][T27665] Call Trace: [ 1858.710392][T27665] dump_stack+0x16f/0x1f0 [ 1858.714736][T27665] should_fail.cold+0xa/0x15 [ 1858.719339][T27665] ? fault_create_debugfs_attr+0x180/0x180 16:02:37 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48451e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1858.725155][T27665] ? ___might_sleep+0x131/0x280 [ 1858.730112][T27665] should_fail_alloc_page+0x50/0x60 [ 1858.735311][T27665] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1858.740703][T27665] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1858.747962][T27665] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1858.754220][T27665] ? find_next_bit+0x107/0x130 [ 1858.767600][T27665] ? __cpu_to_node+0x7e/0xa0 16:02:37 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480a00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:37 executing program 3 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1858.772207][T27665] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 1858.777763][T27665] blk_mq_alloc_rqs+0x223/0x7f0 [ 1858.782638][T27665] ? __kmalloc_node+0x4e/0x70 [ 1858.787446][T27665] __blk_mq_alloc_rq_map+0x15f/0x2e0 [ 1858.792792][T27665] ? kasan_kmalloc+0x9/0x10 [ 1858.797328][T27665] blk_mq_alloc_tag_set+0x78a/0xd40 [ 1858.802575][T27665] loop_add+0x286/0x8d0 [ 1858.806851][T27665] ? idr_find+0x47/0x60 [ 1858.811026][T27665] loop_control_ioctl+0x165/0x360 [ 1858.816057][T27665] ? loop_add+0x8d0/0x8d0 [ 1858.820403][T27665] ? loop_add+0x8d0/0x8d0 [ 1858.824748][T27665] do_vfs_ioctl+0xdb6/0x13e0 [ 1858.829354][T27665] ? ioctl_preallocate+0x210/0x210 [ 1858.834578][T27665] ? __fget+0x388/0x560 [ 1858.838753][T27665] ? ksys_dup3+0x3e0/0x3e0 [ 1858.843188][T27665] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1858.849441][T27665] ? fput_many+0x12c/0x1a0 [ 1858.853873][T27665] ? tomoyo_file_ioctl+0x23/0x30 [ 1858.858823][T27665] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1858.865083][T27665] ? security_file_ioctl+0x8d/0xc0 [ 1858.870207][T27665] ksys_ioctl+0xab/0xd0 16:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1858.874743][T27665] __x64_sys_ioctl+0x73/0xb0 [ 1858.879345][T27665] do_syscall_64+0xfd/0x6a0 [ 1858.883870][T27665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1858.889770][T27665] RIP: 0033:0x459829 [ 1858.893677][T27665] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1858.914162][T27665] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:02:37 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1858.922594][T27665] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1858.930586][T27665] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1858.938575][T27665] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1858.947634][T27665] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1858.955707][T27665] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1859.123575][T27776] FAULT_INJECTION: forcing a failure. [ 1859.123575][T27776] name failslab, interval 1, probability 0, space 0, times 0 [ 1859.136390][T27776] CPU: 0 PID: 27776 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1859.144033][T27776] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.154118][T27776] Call Trace: [ 1859.157429][T27776] dump_stack+0x16f/0x1f0 [ 1859.161785][T27776] should_fail.cold+0xa/0x15 [ 1859.166423][T27776] ? fault_create_debugfs_attr+0x180/0x180 [ 1859.172256][T27776] __should_failslab+0x121/0x190 [ 1859.177204][T27776] should_failslab+0x9/0x14 [ 1859.181745][T27776] kmem_cache_alloc_node_trace+0x269/0x730 [ 1859.187667][T27776] ? alloc_fdtable+0x86/0x290 [ 1859.192366][T27776] __kmalloc_node+0x3d/0x70 [ 1859.196888][T27776] kvmalloc_node+0x68/0x100 [ 1859.201412][T27776] alloc_fdtable+0xd6/0x290 [ 1859.205953][T27776] dup_fd+0x782/0xb70 [ 1859.209989][T27776] copy_process+0x1abc/0x6880 [ 1859.214777][T27776] ? get_pid_task+0xcb/0x190 16:02:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, 0x0) close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1859.219402][T27776] ? __cleanup_sighand+0x60/0x60 [ 1859.224348][T27776] ? __f_unlock_pos+0x19/0x20 [ 1859.229042][T27776] ? lock_downgrade+0x920/0x920 [ 1859.233938][T27776] ? vfs_write+0x34c/0x5d0 [ 1859.238378][T27776] _do_fork+0x146/0xf60 [ 1859.242571][T27776] ? copy_init_mm+0x20/0x20 [ 1859.247117][T27776] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1859.252691][T27776] ? wait_for_completion+0x440/0x440 [ 1859.258012][T27776] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1859.264275][T27776] __x64_sys_clone+0x18d/0x250 [ 1859.269046][T27776] ? ksys_write+0x1cf/0x290 16:02:38 executing program 5 (fault-call:4 fault-nth:13): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1859.273561][T27776] ? __ia32_sys_vfork+0xc0/0xc0 [ 1859.273591][T27776] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1859.273613][T27776] ? trace_hardirqs_on+0x67/0x220 [ 1859.273639][T27776] do_syscall_64+0xfd/0x6a0 [ 1859.273665][T27776] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1859.273678][T27776] RIP: 0033:0x459829 [ 1859.273701][T27776] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48003f001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1859.322745][T27776] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1859.331171][T27776] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1859.331180][T27776] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1859.331189][T27776] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1859.331198][T27776] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1859.331207][T27776] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1859.486864][T27796] FAULT_INJECTION: forcing a failure. [ 1859.486864][T27796] name failslab, interval 1, probability 0, space 0, times 0 [ 1859.500107][T27796] CPU: 1 PID: 27796 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1859.507761][T27796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.517851][T27796] Call Trace: [ 1859.521161][T27796] dump_stack+0x16f/0x1f0 [ 1859.525515][T27796] should_fail.cold+0xa/0x15 [ 1859.530130][T27796] ? fault_create_debugfs_attr+0x180/0x180 [ 1859.535981][T27796] __should_failslab+0x121/0x190 [ 1859.541215][T27796] should_failslab+0x9/0x14 [ 1859.545756][T27796] kmem_cache_alloc_node+0x25d/0x720 [ 1859.551175][T27796] ? debug_mutex_init+0x2d/0x5a [ 1859.556071][T27796] ? __mutex_init+0xef/0x130 [ 1859.560717][T27796] blk_alloc_queue_node+0x32/0x780 [ 1859.565867][T27796] blk_mq_init_queue+0x4a/0xb0 [ 1859.570674][T27796] loop_add+0x2dd/0x8d0 [ 1859.574853][T27796] ? idr_find+0x47/0x60 [ 1859.579047][T27796] loop_control_ioctl+0x165/0x360 [ 1859.584090][T27796] ? loop_add+0x8d0/0x8d0 [ 1859.588446][T27796] ? loop_add+0x8d0/0x8d0 [ 1859.592798][T27796] do_vfs_ioctl+0xdb6/0x13e0 [ 1859.597412][T27796] ? ioctl_preallocate+0x210/0x210 [ 1859.602569][T27796] ? __fget+0x388/0x560 [ 1859.607792][T27796] ? ksys_dup3+0x3e0/0x3e0 [ 1859.612238][T27796] ? tomoyo_file_ioctl+0x23/0x30 [ 1859.617283][T27796] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1859.623543][T27796] ? security_file_ioctl+0x8d/0xc0 [ 1859.628663][T27796] ksys_ioctl+0xab/0xd0 [ 1859.632841][T27796] __x64_sys_ioctl+0x73/0xb0 16:02:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, 0x0) close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400), 0x0, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400), 0x0, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1859.637449][T27796] do_syscall_64+0xfd/0x6a0 [ 1859.641975][T27796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1859.647881][T27796] RIP: 0033:0x459829 [ 1859.651790][T27796] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1859.671430][T27796] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1859.679850][T27796] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1859.679859][T27796] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1859.679867][T27796] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1859.679875][T27796] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1859.679883][T27796] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:38 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480e00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:38 executing program 3 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480040001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400), 0x0, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, 0x0) close(r0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1859.845811][T27906] FAULT_INJECTION: forcing a failure. [ 1859.845811][T27906] name failslab, interval 1, probability 0, space 0, times 0 [ 1859.858675][T27906] CPU: 1 PID: 27906 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1859.866329][T27906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1859.876413][T27906] Call Trace: [ 1859.879749][T27906] dump_stack+0x16f/0x1f0 [ 1859.884135][T27906] should_fail.cold+0xa/0x15 [ 1859.888769][T27906] ? fault_create_debugfs_attr+0x180/0x180 16:02:38 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="481e45001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1859.894624][T27906] __should_failslab+0x121/0x190 [ 1859.899585][T27906] should_failslab+0x9/0x14 [ 1859.904809][T27906] kmem_cache_alloc+0x298/0x700 [ 1859.909671][T27906] ? dup_fd+0x600/0xb70 [ 1859.913850][T27906] copy_fs_struct+0x43/0x2d0 [ 1859.918466][T27906] copy_process+0x45fd/0x6880 [ 1859.923167][T27906] ? get_pid_task+0xcb/0x190 [ 1859.927790][T27906] ? __cleanup_sighand+0x60/0x60 [ 1859.932741][T27906] ? __f_unlock_pos+0x19/0x20 [ 1859.937456][T27906] ? lock_downgrade+0x920/0x920 [ 1859.942332][T27906] ? vfs_write+0x34c/0x5d0 [ 1859.946787][T27906] _do_fork+0x146/0xf60 [ 1859.950975][T27906] ? copy_init_mm+0x20/0x20 [ 1859.955508][T27906] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1859.961093][T27906] ? wait_for_completion+0x440/0x440 [ 1859.966425][T27906] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1859.972699][T27906] __x64_sys_clone+0x18d/0x250 [ 1859.977482][T27906] ? ksys_write+0x1cf/0x290 [ 1859.982007][T27906] ? __ia32_sys_vfork+0xc0/0xc0 [ 1859.986888][T27906] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1859.992203][T27906] ? trace_hardirqs_on+0x67/0x220 [ 1859.997262][T27906] do_syscall_64+0xfd/0x6a0 [ 1860.001805][T27906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1860.007895][T27906] RIP: 0033:0x459829 [ 1860.011848][T27906] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1860.031476][T27906] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1860.039917][T27906] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1860.047906][T27906] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1860.055895][T27906] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1860.063910][T27906] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1860.071983][T27906] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:39 executing program 5 (fault-call:4 fault-nth:14): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480060001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480f00001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480ec0001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:39 executing program 3 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1860.503172][T28147] FAULT_INJECTION: forcing a failure. [ 1860.503172][T28147] name failslab, interval 1, probability 0, space 0, times 0 [ 1860.516060][T28147] CPU: 0 PID: 28147 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1860.523795][T28147] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1860.533861][T28147] Call Trace: [ 1860.537167][T28147] dump_stack+0x16f/0x1f0 [ 1860.541513][T28147] should_fail.cold+0xa/0x15 [ 1860.546122][T28147] ? fault_create_debugfs_attr+0x180/0x180 [ 1860.551964][T28147] __should_failslab+0x121/0x190 [ 1860.556924][T28147] should_failslab+0x9/0x14 [ 1860.561445][T28147] kmem_cache_alloc+0x298/0x700 [ 1860.566405][T28147] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1860.572239][T28147] ? mempool_free+0x370/0x370 [ 1860.576940][T28147] mempool_alloc_slab+0x47/0x60 [ 1860.581808][T28147] ? mempool_alloc+0x380/0x380 [ 1860.586591][T28147] mempool_init_node+0x2df/0x560 [ 1860.591551][T28147] ? mempool_alloc+0x380/0x380 [ 1860.596322][T28147] ? mempool_free+0x370/0x370 [ 1860.601017][T28147] mempool_init+0x3d/0x50 [ 1860.605576][T28147] bioset_init+0x33a/0x700 [ 1860.610015][T28147] blk_alloc_queue_node+0x137/0x780 [ 1860.615251][T28147] blk_mq_init_queue+0x4a/0xb0 [ 1860.620052][T28147] loop_add+0x2dd/0x8d0 [ 1860.624256][T28147] ? idr_find+0x47/0x60 [ 1860.628442][T28147] loop_control_ioctl+0x165/0x360 [ 1860.633488][T28147] ? loop_add+0x8d0/0x8d0 [ 1860.637839][T28147] ? loop_add+0x8d0/0x8d0 [ 1860.642186][T28147] do_vfs_ioctl+0xdb6/0x13e0 [ 1860.646801][T28147] ? ioctl_preallocate+0x210/0x210 [ 1860.652201][T28147] ? __fget+0x388/0x560 [ 1860.656374][T28147] ? ksys_dup3+0x3e0/0x3e0 [ 1860.660815][T28147] ? tomoyo_file_ioctl+0x23/0x30 [ 1860.665799][T28147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1860.672065][T28147] ? security_file_ioctl+0x8d/0xc0 [ 1860.677192][T28147] ksys_ioctl+0xab/0xd0 [ 1860.681382][T28147] __x64_sys_ioctl+0x73/0xb0 [ 1860.685990][T28147] ? do_syscall_64+0x5b/0x6a0 [ 1860.690687][T28147] do_syscall_64+0xfd/0x6a0 [ 1860.695219][T28147] entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:02:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)="236d69cb340a1c4ae075f70f4f387f7782a41315b978ece103210741f29be711d2dd5651b6df33e40aa4a8ce147446592a1581b73504cfb6ee48d954ec1cbb7a70584c4f09c30caf44f525af7917086d8a153bbe7fa15afe2c7cc2ceb2242554de2028d0793fd4c97fd76ed8d4b75cc8e042b1f6ac082f617ed942f88f2031f90eff62583fc1f216cb5e9721", 0x8c}], 0x1, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1860.701119][T28147] RIP: 0033:0x459829 [ 1860.705018][T28147] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1860.724631][T28147] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1860.733060][T28147] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1860.741079][T28147] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 16:02:39 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="486000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1860.750585][T28147] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1860.758564][T28147] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1860.772975][T28147] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:39 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800f0001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1860.937009][T28248] FAULT_INJECTION: forcing a failure. [ 1860.937009][T28248] name failslab, interval 1, probability 0, space 0, times 0 [ 1860.949931][T28248] CPU: 1 PID: 28248 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1860.957586][T28248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1860.967754][T28248] Call Trace: [ 1860.971080][T28248] dump_stack+0x16f/0x1f0 [ 1860.975460][T28248] should_fail.cold+0xa/0x15 [ 1860.980080][T28248] ? fault_create_debugfs_attr+0x180/0x180 [ 1860.985927][T28248] __should_failslab+0x121/0x190 [ 1860.990906][T28248] should_failslab+0x9/0x14 [ 1860.995457][T28248] kmem_cache_alloc+0x298/0x700 [ 1861.000356][T28248] ? do_raw_spin_unlock+0x57/0x270 [ 1861.005487][T28248] ? _raw_spin_unlock+0x23/0x30 [ 1861.005512][T28248] copy_process+0x1c14/0x6880 [ 1861.005529][T28248] ? get_pid_task+0xcb/0x190 [ 1861.005564][T28248] ? __cleanup_sighand+0x60/0x60 [ 1861.024591][T28248] ? __f_unlock_pos+0x19/0x20 [ 1861.029300][T28248] ? lock_downgrade+0x920/0x920 [ 1861.034167][T28248] ? vfs_write+0x34c/0x5d0 [ 1861.038603][T28248] _do_fork+0x146/0xf60 [ 1861.042773][T28248] ? copy_init_mm+0x20/0x20 [ 1861.047288][T28248] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1861.052849][T28248] ? wait_for_completion+0x440/0x440 [ 1861.058166][T28248] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1861.064529][T28248] __x64_sys_clone+0x18d/0x250 [ 1861.069317][T28248] ? ksys_write+0x1cf/0x290 [ 1861.073856][T28248] ? __ia32_sys_vfork+0xc0/0xc0 [ 1861.078740][T28248] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1861.084056][T28248] ? trace_hardirqs_on+0x67/0x220 [ 1861.089111][T28248] do_syscall_64+0xfd/0x6a0 [ 1861.093702][T28248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1861.099609][T28248] RIP: 0033:0x459829 [ 1861.103554][T28248] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1861.123544][T28248] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 16:02:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:39 executing program 5 (fault-call:4 fault-nth:15): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1861.131982][T28248] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1861.139976][T28248] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1861.147960][T28248] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1861.147969][T28248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1861.147977][T28248] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48f000001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1861.223208][T28354] FAULT_INJECTION: forcing a failure. [ 1861.223208][T28354] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.235952][T28354] CPU: 1 PID: 28354 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1861.243706][T28354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1861.253796][T28354] Call Trace: [ 1861.257135][T28354] dump_stack+0x16f/0x1f0 [ 1861.261596][T28354] should_fail.cold+0xa/0x15 [ 1861.266238][T28354] ? fault_create_debugfs_attr+0x180/0x180 16:02:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:40 executing program 3 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1861.272079][T28354] __should_failslab+0x121/0x190 [ 1861.277161][T28354] should_failslab+0x9/0x14 [ 1861.281686][T28354] kmem_cache_alloc+0x298/0x700 [ 1861.286594][T28354] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1861.292855][T28354] ? __phys_addr+0xa4/0x120 [ 1861.297377][T28354] ? mempool_init+0x3d/0x50 [ 1861.301913][T28354] mempool_alloc_slab+0x47/0x60 [ 1861.306809][T28354] ? mempool_alloc+0x380/0x380 [ 1861.311590][T28354] mempool_init_node+0x2df/0x560 [ 1861.316652][T28354] ? mempool_alloc+0x380/0x380 16:02:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1861.321453][T28354] ? mempool_free+0x370/0x370 [ 1861.326154][T28354] mempool_init+0x3d/0x50 [ 1861.330539][T28354] bioset_init+0x33a/0x700 [ 1861.334985][T28354] blk_alloc_queue_node+0x137/0x780 [ 1861.340210][T28354] blk_mq_init_queue+0x4a/0xb0 [ 1861.344991][T28354] loop_add+0x2dd/0x8d0 [ 1861.349161][T28354] ? idr_find+0x47/0x60 [ 1861.353340][T28354] loop_control_ioctl+0x165/0x360 [ 1861.358389][T28354] ? loop_add+0x8d0/0x8d0 [ 1861.362772][T28354] ? loop_add+0x8d0/0x8d0 [ 1861.367132][T28354] do_vfs_ioctl+0xdb6/0x13e0 16:02:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1861.371835][T28354] ? ioctl_preallocate+0x210/0x210 [ 1861.376977][T28354] ? __fget+0x388/0x560 [ 1861.381195][T28354] ? ksys_dup3+0x3e0/0x3e0 [ 1861.385644][T28354] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1861.391894][T28354] ? fput_many+0x12c/0x1a0 [ 1861.396324][T28354] ? tomoyo_file_ioctl+0x23/0x30 [ 1861.401273][T28354] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1861.407539][T28354] ? security_file_ioctl+0x8d/0xc0 [ 1861.412755][T28354] ksys_ioctl+0xab/0xd0 [ 1861.416917][T28354] __x64_sys_ioctl+0x73/0xb0 [ 1861.421504][T28354] do_syscall_64+0xfd/0x6a0 [ 1861.425994][T28354] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1861.431880][T28354] RIP: 0033:0x459829 [ 1861.435758][T28354] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1861.455468][T28354] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1861.463905][T28354] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 16:02:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1861.471901][T28354] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1861.479907][T28354] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1861.487884][T28354] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1861.495863][T28354] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1861.592752][T28465] FAULT_INJECTION: forcing a failure. [ 1861.592752][T28465] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.605645][T28465] CPU: 1 PID: 28465 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1861.613290][T28465] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1861.623362][T28465] Call Trace: [ 1861.626682][T28465] dump_stack+0x16f/0x1f0 [ 1861.631125][T28465] should_fail.cold+0xa/0x15 [ 1861.635739][T28465] ? fault_create_debugfs_attr+0x180/0x180 16:02:40 executing program 5 (fault-call:4 fault-nth:16): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1861.641581][T28465] __should_failslab+0x121/0x190 [ 1861.646538][T28465] should_failslab+0x9/0x14 [ 1861.651061][T28465] kmem_cache_alloc+0x298/0x700 [ 1861.655949][T28465] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1861.661259][T28465] ? trace_hardirqs_on+0x67/0x220 [ 1861.666303][T28465] ? __kasan_check_read+0x11/0x20 [ 1861.671353][T28465] copy_process+0x1d71/0x6880 [ 1861.676074][T28465] ? __cleanup_sighand+0x60/0x60 [ 1861.681043][T28465] ? __perf_event_task_sched_in+0x182/0x8c0 [ 1861.687247][T28465] ? lock_downgrade+0x920/0x920 [ 1861.692134][T28465] _do_fork+0x146/0xf60 [ 1861.696419][T28465] ? copy_init_mm+0x20/0x20 [ 1861.701038][T28465] ? _raw_spin_unlock_irq+0x28/0x70 [ 1861.706260][T28465] ? finish_task_switch+0x11d/0x690 [ 1861.711485][T28465] ? finish_task_switch+0xef/0x690 [ 1861.716719][T28465] ? __schedule+0x77a/0x1530 [ 1861.721328][T28465] __x64_sys_clone+0x18d/0x250 [ 1861.726129][T28465] ? __ia32_sys_vfork+0xc0/0xc0 [ 1861.731010][T28465] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1861.736311][T28465] ? trace_hardirqs_on+0x67/0x220 16:02:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1861.741355][T28465] do_syscall_64+0xfd/0x6a0 [ 1861.745882][T28465] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1861.751787][T28465] RIP: 0033:0x459829 [ 1861.755705][T28465] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1861.775323][T28465] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1861.783755][T28465] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1861.791740][T28465] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1861.799721][T28465] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1861.807701][T28465] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1861.815663][T28574] FAULT_INJECTION: forcing a failure. [ 1861.815663][T28574] name failslab, interval 1, probability 0, space 0, times 0 [ 1861.828249][T28465] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1861.836259][T28574] CPU: 0 PID: 28574 Comm: syz-executor.5 Not tainted 5.2.0+ #71 16:02:40 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000022300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1861.843939][T28574] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1861.854008][T28574] Call Trace: [ 1861.857309][T28574] dump_stack+0x16f/0x1f0 [ 1861.861672][T28574] should_fail.cold+0xa/0x15 [ 1861.866274][T28574] ? fault_create_debugfs_attr+0x180/0x180 [ 1861.872101][T28574] __should_failslab+0x121/0x190 [ 1861.877081][T28574] should_failslab+0x9/0x14 [ 1861.881594][T28574] kmem_cache_alloc+0x298/0x700 [ 1861.886460][T28574] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 16:02:40 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48000a001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1861.892712][T28574] ? __phys_addr+0xa4/0x120 [ 1861.897217][T28574] ? mempool_init+0x3d/0x50 [ 1861.901748][T28574] mempool_alloc_slab+0x47/0x60 [ 1861.906617][T28574] ? mempool_alloc+0x380/0x380 [ 1861.911390][T28574] mempool_init_node+0x2df/0x560 [ 1861.916348][T28574] ? mempool_alloc+0x380/0x380 [ 1861.921120][T28574] ? mempool_free+0x370/0x370 [ 1861.925807][T28574] mempool_init+0x3d/0x50 [ 1861.930157][T28574] bioset_init+0x33a/0x700 [ 1861.934590][T28574] blk_alloc_queue_node+0x137/0x780 [ 1861.939804][T28574] blk_mq_init_queue+0x4a/0xb0 16:02:40 executing program 3 (fault-call:3 fault-nth:15): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1861.944590][T28574] loop_add+0x2dd/0x8d0 [ 1861.948773][T28574] ? idr_find+0x47/0x60 [ 1861.952957][T28574] loop_control_ioctl+0x165/0x360 [ 1861.957992][T28574] ? loop_add+0x8d0/0x8d0 [ 1861.962338][T28574] ? loop_add+0x8d0/0x8d0 [ 1861.966690][T28574] do_vfs_ioctl+0xdb6/0x13e0 [ 1861.971301][T28574] ? ioctl_preallocate+0x210/0x210 [ 1861.976426][T28574] ? __fget+0x388/0x560 [ 1861.980610][T28574] ? ksys_dup3+0x3e0/0x3e0 [ 1861.985033][T28574] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 16:02:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) [ 1861.991376][T28574] ? fput_many+0x12c/0x1a0 [ 1861.995850][T28574] ? tomoyo_file_ioctl+0x23/0x30 [ 1862.000798][T28574] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1862.007057][T28574] ? security_file_ioctl+0x8d/0xc0 [ 1862.012360][T28574] ksys_ioctl+0xab/0xd0 [ 1862.016540][T28574] __x64_sys_ioctl+0x73/0xb0 [ 1862.021151][T28574] do_syscall_64+0xfd/0x6a0 [ 1862.025687][T28574] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1862.031612][T28574] RIP: 0033:0x459829 16:02:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}], 0x20, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1862.035514][T28574] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1862.055129][T28574] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1862.063557][T28574] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1862.071534][T28574] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1862.079512][T28574] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1862.087755][T28574] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1862.095742][T28574] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}], 0x20, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:41 executing program 5 (fault-call:4 fault-nth:17): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}], 0x20, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1862.274026][T28589] FAULT_INJECTION: forcing a failure. [ 1862.274026][T28589] name failslab, interval 1, probability 0, space 0, times 0 [ 1862.287011][T28589] CPU: 0 PID: 28589 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1862.294837][T28589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1862.304989][T28589] Call Trace: [ 1862.308297][T28589] dump_stack+0x16f/0x1f0 [ 1862.312661][T28589] should_fail.cold+0xa/0x15 [ 1862.317288][T28589] ? fault_create_debugfs_attr+0x180/0x180 [ 1862.323302][T28589] __should_failslab+0x121/0x190 [ 1862.328268][T28589] should_failslab+0x9/0x14 [ 1862.332794][T28589] kmem_cache_alloc+0x298/0x700 [ 1862.332827][T28589] dup_mm+0x8a/0x1430 [ 1862.332847][T28589] ? copy_process+0x21e5/0x6880 [ 1862.332878][T28589] ? lock_downgrade+0x920/0x920 [ 1862.341687][T28589] ? vm_area_dup+0x170/0x170 [ 1862.356211][T28589] ? debug_mutex_init+0x2d/0x5a [ 1862.361106][T28589] copy_process+0x26fb/0x6880 [ 1862.365786][T28589] ? get_pid_task+0xcb/0x190 16:02:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48000e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1862.370492][T28589] ? __cleanup_sighand+0x60/0x60 [ 1862.375702][T28589] ? __f_unlock_pos+0x19/0x20 [ 1862.380406][T28589] ? lock_downgrade+0x920/0x920 [ 1862.385270][T28589] ? vfs_write+0x34c/0x5d0 [ 1862.389701][T28589] _do_fork+0x146/0xf60 [ 1862.393868][T28589] ? copy_init_mm+0x20/0x20 [ 1862.398474][T28589] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1862.404034][T28589] ? wait_for_completion+0x440/0x440 [ 1862.409337][T28589] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1862.415683][T28589] __x64_sys_clone+0x18d/0x250 [ 1862.420461][T28589] ? ksys_write+0x1cf/0x290 [ 1862.424981][T28589] ? __ia32_sys_vfork+0xc0/0xc0 [ 1862.429882][T28589] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1862.435183][T28589] ? trace_hardirqs_on+0x67/0x220 [ 1862.440259][T28589] do_syscall_64+0xfd/0x6a0 [ 1862.444810][T28589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1862.450708][T28589] RIP: 0033:0x459829 [ 1862.454694][T28589] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1862.454703][T28589] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1862.454718][T28589] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1862.454727][T28589] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1862.454736][T28589] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1862.454744][T28589] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1862.454751][T28589] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x2) 16:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}], 0x20, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1862.605540][T28790] FAULT_INJECTION: forcing a failure. [ 1862.605540][T28790] name failslab, interval 1, probability 0, space 0, times 0 [ 1862.618358][T28790] CPU: 0 PID: 28790 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1862.626006][T28790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1862.636176][T28790] Call Trace: [ 1862.639503][T28790] dump_stack+0x16f/0x1f0 [ 1862.643871][T28790] should_fail.cold+0xa/0x15 [ 1862.648518][T28790] ? fault_create_debugfs_attr+0x180/0x180 [ 1862.654494][T28790] __should_failslab+0x121/0x190 [ 1862.659653][T28790] should_failslab+0x9/0x14 [ 1862.664186][T28790] kmem_cache_alloc+0x298/0x700 [ 1862.669151][T28790] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 1862.674982][T28790] ? mempool_free+0x370/0x370 [ 1862.679676][T28790] mempool_alloc_slab+0x47/0x60 [ 1862.684588][T28790] ? mempool_alloc+0x380/0x380 [ 1862.689375][T28790] mempool_init_node+0x2df/0x560 [ 1862.694344][T28790] ? mempool_alloc+0x380/0x380 [ 1862.699135][T28790] ? mempool_free+0x370/0x370 [ 1862.703831][T28790] mempool_init+0x3d/0x50 [ 1862.708530][T28790] bioset_init+0x536/0x700 [ 1862.712966][T28790] blk_alloc_queue_node+0x137/0x780 [ 1862.718186][T28790] blk_mq_init_queue+0x4a/0xb0 [ 1862.722960][T28790] loop_add+0x2dd/0x8d0 [ 1862.727128][T28790] ? idr_find+0x47/0x60 [ 1862.731304][T28790] loop_control_ioctl+0x165/0x360 [ 1862.736367][T28790] ? loop_add+0x8d0/0x8d0 [ 1862.740704][T28790] ? loop_add+0x8d0/0x8d0 [ 1862.746517][T28790] do_vfs_ioctl+0xdb6/0x13e0 [ 1862.751127][T28790] ? ioctl_preallocate+0x210/0x210 [ 1862.756282][T28790] ? __fget+0x388/0x560 [ 1862.760561][T28790] ? ksys_dup3+0x3e0/0x3e0 [ 1862.765954][T28790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1862.772375][T28790] ? fput_many+0x12c/0x1a0 [ 1862.776809][T28790] ? tomoyo_file_ioctl+0x23/0x30 [ 1862.781751][T28790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1862.781769][T28790] ? security_file_ioctl+0x8d/0xc0 [ 1862.781785][T28790] ksys_ioctl+0xab/0xd0 [ 1862.781801][T28790] __x64_sys_ioctl+0x73/0xb0 [ 1862.781818][T28790] do_syscall_64+0xfd/0x6a0 [ 1862.781839][T28790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1862.781851][T28790] RIP: 0033:0x459829 [ 1862.781868][T28790] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1862.781876][T28790] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1862.793228][T28790] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 16:02:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) 16:02:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000ec000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:41 executing program 3 (fault-call:3 fault-nth:16): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:41 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48c00e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}], 0x20, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:41 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480002001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1862.793237][T28790] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1862.793244][T28790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1862.793252][T28790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1862.793259][T28790] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:41 executing program 5 (fault-call:4 fault-nth:18): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:41 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}], 0x20, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1863.154448][T28903] FAULT_INJECTION: forcing a failure. [ 1863.154448][T28903] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1863.166224][T28926] FAULT_INJECTION: forcing a failure. [ 1863.166224][T28926] name failslab, interval 1, probability 0, space 0, times 0 [ 1863.167919][T28903] CPU: 1 PID: 28903 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1863.188018][T28903] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1863.198084][T28903] Call Trace: [ 1863.201395][T28903] dump_stack+0x16f/0x1f0 [ 1863.205754][T28903] should_fail.cold+0xa/0x15 [ 1863.210361][T28903] ? fault_create_debugfs_attr+0x180/0x180 [ 1863.216191][T28903] ? ___might_sleep+0x131/0x280 [ 1863.221057][T28903] should_fail_alloc_page+0x50/0x60 [ 1863.226265][T28903] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1863.231640][T28903] ? __lock_acquire+0x8a2/0x4c30 [ 1863.236584][T28903] ? rcu_read_unlock+0x16/0x70 [ 1863.241356][T28903] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1863.247085][T28903] ? find_held_lock+0x35/0x130 [ 1863.251849][T28903] ? memcg_kmem_put_cache+0xaf/0x1b0 [ 1863.257296][T28903] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1863.263548][T28903] alloc_pages_current+0x107/0x210 [ 1863.268695][T28903] __get_free_pages+0xc/0x40 [ 1863.273287][T28903] pgd_alloc+0x8b/0x3f0 [ 1863.277450][T28903] ? pgd_page_get_mm+0x40/0x40 [ 1863.282222][T28903] ? lockdep_init_map+0x1be/0x6d0 [ 1863.287259][T28903] ? lockdep_init_map+0x1be/0x6d0 [ 1863.292400][T28903] mm_init+0x590/0x9b0 [ 1863.296509][T28903] dup_mm+0xde/0x1430 [ 1863.300516][T28903] ? copy_process+0x21e5/0x6880 [ 1863.305491][T28903] ? lock_downgrade+0x920/0x920 [ 1863.310465][T28903] ? vm_area_dup+0x170/0x170 [ 1863.315698][T28903] ? debug_mutex_init+0x2d/0x5a [ 1863.320666][T28903] copy_process+0x26fb/0x6880 [ 1863.325369][T28903] ? get_pid_task+0xcb/0x190 [ 1863.329985][T28903] ? __cleanup_sighand+0x60/0x60 [ 1863.334931][T28903] ? __f_unlock_pos+0x19/0x20 [ 1863.339645][T28903] ? lock_downgrade+0x920/0x920 [ 1863.344502][T28903] ? vfs_write+0x34c/0x5d0 [ 1863.348933][T28903] _do_fork+0x146/0xf60 [ 1863.353186][T28903] ? copy_init_mm+0x20/0x20 [ 1863.357697][T28903] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1863.363251][T28903] ? wait_for_completion+0x440/0x440 [ 1863.368552][T28903] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1863.374923][T28903] __x64_sys_clone+0x18d/0x250 [ 1863.379706][T28903] ? ksys_write+0x1cf/0x290 [ 1863.384230][T28903] ? __ia32_sys_vfork+0xc0/0xc0 [ 1863.389116][T28903] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1863.394427][T28903] ? trace_hardirqs_on+0x67/0x220 [ 1863.399565][T28903] do_syscall_64+0xfd/0x6a0 [ 1863.404092][T28903] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1863.409993][T28903] RIP: 0033:0x459829 [ 1863.413894][T28903] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1863.433591][T28903] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1863.442018][T28903] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1863.450000][T28903] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1863.457983][T28903] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1863.465967][T28903] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1863.473951][T28903] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1863.481962][T28926] CPU: 0 PID: 28926 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1863.489608][T28926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1863.499698][T28926] Call Trace: 16:02:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480004001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1863.503010][T28926] dump_stack+0x16f/0x1f0 [ 1863.507488][T28926] should_fail.cold+0xa/0x15 [ 1863.512130][T28926] ? fault_create_debugfs_attr+0x180/0x180 [ 1863.518066][T28926] __should_failslab+0x121/0x190 [ 1863.523114][T28926] should_failslab+0x9/0x14 [ 1863.527727][T28926] kmem_cache_alloc+0x298/0x700 [ 1863.532684][T28926] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1863.538989][T28926] ? __phys_addr+0xa4/0x120 [ 1863.543522][T28926] ? mempool_init+0x3d/0x50 [ 1863.548043][T28926] mempool_alloc_slab+0x47/0x60 [ 1863.552898][T28926] ? mempool_alloc+0x380/0x380 [ 1863.557767][T28926] mempool_init_node+0x2df/0x560 [ 1863.562744][T28926] ? mempool_alloc+0x380/0x380 [ 1863.567742][T28926] ? mempool_free+0x370/0x370 [ 1863.572432][T28926] mempool_init+0x3d/0x50 [ 1863.576832][T28926] bioset_init+0x536/0x700 [ 1863.581284][T28926] blk_alloc_queue_node+0x137/0x780 [ 1863.586509][T28926] blk_mq_init_queue+0x4a/0xb0 [ 1863.591305][T28926] loop_add+0x2dd/0x8d0 [ 1863.595554][T28926] ? idr_find+0x47/0x60 [ 1863.599725][T28926] loop_control_ioctl+0x165/0x360 16:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:42 executing program 3 (fault-call:3 fault-nth:17): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1863.604893][T28926] ? loop_add+0x8d0/0x8d0 [ 1863.609420][T28926] ? loop_add+0x8d0/0x8d0 [ 1863.613784][T28926] do_vfs_ioctl+0xdb6/0x13e0 [ 1863.618388][T28926] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1863.623864][T28926] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1863.629167][T28926] ? ioctl_preallocate+0x210/0x210 [ 1863.634295][T28926] ? trace_hardirqs_on_thunk+0x1a/0x20 [ 1863.639784][T28926] ? retint_kernel+0x10/0x10 [ 1863.644399][T28926] ksys_ioctl+0xab/0xd0 [ 1863.648830][T28926] __x64_sys_ioctl+0x73/0xb0 16:02:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48000f001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) [ 1863.653621][T28926] do_syscall_64+0xfd/0x6a0 [ 1863.658139][T28926] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1863.664044][T28926] RIP: 0033:0x459829 [ 1863.667954][T28926] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1863.687665][T28926] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1863.696135][T28926] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 16:02:42 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1863.704120][T28926] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1863.712104][T28926] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1863.720103][T28926] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1863.728174][T28926] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1863.882639][T28941] FAULT_INJECTION: forcing a failure. [ 1863.882639][T28941] name failslab, interval 1, probability 0, space 0, times 0 [ 1863.895820][T28941] CPU: 1 PID: 28941 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1863.904353][T28941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1863.914434][T28941] Call Trace: [ 1863.917837][T28941] dump_stack+0x16f/0x1f0 [ 1863.922198][T28941] should_fail.cold+0xa/0x15 [ 1863.922220][T28941] ? fault_create_debugfs_attr+0x180/0x180 [ 1863.922247][T28941] __should_failslab+0x121/0x190 [ 1863.922281][T28941] should_failslab+0x9/0x14 [ 1863.943676][T28941] kmem_cache_alloc+0x298/0x700 [ 1863.948632][T28941] ? get_mm_exe_file+0x287/0x3f0 [ 1863.953587][T28941] ? copy_clone_args_from_user+0x570/0x570 [ 1863.959405][T28941] __khugepaged_enter+0x3b/0x3a0 [ 1863.964462][T28941] dup_mm+0xca2/0x1430 [ 1863.968551][T28941] ? lock_downgrade+0x920/0x920 [ 1863.973418][T28941] ? vm_area_dup+0x170/0x170 [ 1863.978024][T28941] ? debug_mutex_init+0x2d/0x5a [ 1863.982900][T28941] copy_process+0x26fb/0x6880 [ 1863.987590][T28941] ? get_pid_task+0xcb/0x190 [ 1863.992205][T28941] ? __cleanup_sighand+0x60/0x60 [ 1863.997154][T28941] ? __f_unlock_pos+0x19/0x20 [ 1864.001853][T28941] ? lock_downgrade+0x920/0x920 [ 1864.006721][T28941] ? vfs_write+0x34c/0x5d0 [ 1864.011251][T28941] _do_fork+0x146/0xf60 [ 1864.015600][T28941] ? copy_init_mm+0x20/0x20 [ 1864.020198][T28941] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1864.025773][T28941] ? wait_for_completion+0x440/0x440 [ 1864.031093][T28941] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1864.037433][T28941] __x64_sys_clone+0x18d/0x250 [ 1864.042228][T28941] ? ksys_write+0x1cf/0x290 [ 1864.046761][T28941] ? __ia32_sys_vfork+0xc0/0xc0 [ 1864.051643][T28941] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1864.057042][T28941] ? trace_hardirqs_on+0x67/0x220 [ 1864.062262][T28941] do_syscall_64+0xfd/0x6a0 [ 1864.066792][T28941] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1864.072701][T28941] RIP: 0033:0x459829 16:02:42 executing program 5 (fault-call:4 fault-nth:19): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) socket$rxrpc(0x21, 0x2, 0x2) 16:02:42 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000a001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1864.076600][T28941] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1864.096297][T28941] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1864.104716][T28941] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1864.104726][T28941] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1864.104733][T28941] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1864.104741][T28941] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1864.104748][T28941] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1864.138970][T29047] FAULT_INJECTION: forcing a failure. [ 1864.138970][T29047] name failslab, interval 1, probability 0, space 0, times 0 [ 1864.158067][T29047] CPU: 1 PID: 29047 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1864.165715][T29047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1864.175778][T29047] Call Trace: [ 1864.179083][T29047] dump_stack+0x16f/0x1f0 [ 1864.184051][T29047] should_fail.cold+0xa/0x15 [ 1864.188670][T29047] ? fault_create_debugfs_attr+0x180/0x180 [ 1864.194507][T29047] __should_failslab+0x121/0x190 [ 1864.199463][T29047] should_failslab+0x9/0x14 [ 1864.203974][T29047] kmem_cache_alloc+0x298/0x700 [ 1864.208848][T29047] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1864.215120][T29047] ? __phys_addr+0xa4/0x120 [ 1864.219652][T29047] ? mempool_init+0x3d/0x50 [ 1864.224176][T29047] mempool_alloc_slab+0x47/0x60 [ 1864.229129][T29047] ? mempool_alloc+0x380/0x380 [ 1864.233908][T29047] mempool_init_node+0x2df/0x560 [ 1864.238907][T29047] ? mempool_alloc+0x380/0x380 [ 1864.243716][T29047] ? mempool_free+0x370/0x370 [ 1864.248433][T29047] mempool_init+0x3d/0x50 [ 1864.252967][T29047] bioset_init+0x536/0x700 [ 1864.257439][T29047] blk_alloc_queue_node+0x137/0x780 [ 1864.262678][T29047] blk_mq_init_queue+0x4a/0xb0 [ 1864.267467][T29047] loop_add+0x2dd/0x8d0 [ 1864.271652][T29047] ? idr_find+0x47/0x60 [ 1864.275827][T29047] loop_control_ioctl+0x165/0x360 16:02:42 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48003f001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x0) [ 1864.280960][T29047] ? loop_add+0x8d0/0x8d0 [ 1864.285317][T29047] ? loop_add+0x8d0/0x8d0 [ 1864.289662][T29047] do_vfs_ioctl+0xdb6/0x13e0 [ 1864.294275][T29047] ? ioctl_preallocate+0x210/0x210 [ 1864.299422][T29047] ? __fget+0x388/0x560 [ 1864.303599][T29047] ? ksys_dup3+0x3e0/0x3e0 [ 1864.308033][T29047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1864.314306][T29047] ? fput_many+0x12c/0x1a0 [ 1864.318740][T29047] ? tomoyo_file_ioctl+0x23/0x30 [ 1864.323703][T29047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 16:02:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:43 executing program 3 (fault-call:3 fault-nth:18): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1864.329976][T29047] ? security_file_ioctl+0x8d/0xc0 [ 1864.335113][T29047] ksys_ioctl+0xab/0xd0 [ 1864.339298][T29047] __x64_sys_ioctl+0x73/0xb0 [ 1864.343951][T29047] do_syscall_64+0xfd/0x6a0 [ 1864.348480][T29047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1864.354385][T29047] RIP: 0033:0x459829 [ 1864.358301][T29047] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1864.378090][T29047] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1864.386694][T29047] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1864.394682][T29047] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1864.402689][T29047] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1864.410674][T29047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1864.418749][T29047] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:43 executing program 5 (fault-call:4 fault-nth:20): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1864.626001][T29079] FAULT_INJECTION: forcing a failure. [ 1864.626001][T29079] name failslab, interval 1, probability 0, space 0, times 0 [ 1864.638806][T29079] CPU: 1 PID: 29079 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1864.646456][T29079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1864.656578][T29079] Call Trace: [ 1864.660065][T29079] dump_stack+0x16f/0x1f0 [ 1864.664435][T29079] should_fail.cold+0xa/0x15 [ 1864.669069][T29079] ? fault_create_debugfs_attr+0x180/0x180 [ 1864.670464][T29158] FAULT_INJECTION: forcing a failure. [ 1864.670464][T29158] name failslab, interval 1, probability 0, space 0, times 0 [ 1864.674915][T29079] __should_failslab+0x121/0x190 [ 1864.674941][T29079] should_failslab+0x9/0x14 [ 1864.674960][T29079] kmem_cache_alloc+0x298/0x700 [ 1864.674978][T29079] ? __kasan_check_read+0x11/0x20 [ 1864.674996][T29079] ? do_raw_spin_unlock+0x57/0x270 [ 1864.675022][T29079] vm_area_dup+0x21/0x170 [ 1864.716664][T29079] dup_mm+0x549/0x1430 [ 1864.720763][T29079] ? vm_area_dup+0x170/0x170 [ 1864.725357][T29079] ? debug_mutex_init+0x2d/0x5a [ 1864.730219][T29079] copy_process+0x26fb/0x6880 [ 1864.734902][T29079] ? get_pid_task+0xcb/0x190 [ 1864.739595][T29079] ? __cleanup_sighand+0x60/0x60 [ 1864.745119][T29079] ? __f_unlock_pos+0x19/0x20 [ 1864.749846][T29079] ? lock_downgrade+0x920/0x920 [ 1864.754702][T29079] ? vfs_write+0x34c/0x5d0 [ 1864.759744][T29079] _do_fork+0x146/0xf60 [ 1864.768958][T29079] ? copy_init_mm+0x20/0x20 [ 1864.773470][T29079] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1864.779026][T29079] ? wait_for_completion+0x440/0x440 [ 1864.784324][T29079] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1864.790582][T29079] __x64_sys_clone+0x18d/0x250 [ 1864.795360][T29079] ? ksys_write+0x1cf/0x290 [ 1864.799873][T29079] ? __ia32_sys_vfork+0xc0/0xc0 [ 1864.804741][T29079] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1864.810044][T29079] ? trace_hardirqs_on+0x67/0x220 [ 1864.815166][T29079] do_syscall_64+0xfd/0x6a0 [ 1864.819684][T29079] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1864.825576][T29079] RIP: 0033:0x459829 [ 1864.829471][T29079] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1864.849076][T29079] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1864.857488][T29079] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1864.865452][T29079] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1864.873424][T29079] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1864.881860][T29079] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1864.889838][T29079] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1864.901314][T29158] CPU: 0 PID: 29158 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1864.909132][T29158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1864.919202][T29158] Call Trace: [ 1864.922497][T29158] dump_stack+0x16f/0x1f0 [ 1864.926842][T29158] should_fail.cold+0xa/0x15 [ 1864.931439][T29158] ? fault_create_debugfs_attr+0x180/0x180 [ 1864.937259][T29158] __should_failslab+0x121/0x190 [ 1864.942209][T29158] should_failslab+0x9/0x14 [ 1864.946719][T29158] kmem_cache_alloc+0x298/0x700 [ 1864.951575][T29158] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1864.957826][T29158] ? __phys_addr+0xa4/0x120 [ 1864.962338][T29158] ? mempool_init+0x3d/0x50 [ 1864.966862][T29158] mempool_alloc_slab+0x47/0x60 [ 1864.971752][T29158] ? mempool_alloc+0x380/0x380 [ 1864.976527][T29158] mempool_init_node+0x2df/0x560 [ 1864.981475][T29158] ? mempool_alloc+0x380/0x380 [ 1864.986241][T29158] ? mempool_free+0x370/0x370 [ 1864.990928][T29158] mempool_init+0x3d/0x50 [ 1864.995271][T29158] bioset_init+0x536/0x700 [ 1864.999697][T29158] blk_alloc_queue_node+0x137/0x780 [ 1865.004904][T29158] blk_mq_init_queue+0x4a/0xb0 [ 1865.009675][T29158] loop_add+0x2dd/0x8d0 [ 1865.013835][T29158] ? idr_find+0x47/0x60 [ 1865.018000][T29158] loop_control_ioctl+0x165/0x360 [ 1865.023039][T29158] ? loop_add+0x8d0/0x8d0 16:02:43 executing program 3 (fault-call:3 fault-nth:19): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:43 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x0) 16:02:43 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480040001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1865.027378][T29158] ? loop_add+0x8d0/0x8d0 [ 1865.031719][T29158] do_vfs_ioctl+0xdb6/0x13e0 [ 1865.036316][T29158] ? ioctl_preallocate+0x210/0x210 [ 1865.041435][T29158] ? __fget+0x388/0x560 [ 1865.045598][T29158] ? ksys_dup3+0x3e0/0x3e0 [ 1865.050038][T29158] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1865.056289][T29158] ? fput_many+0x12c/0x1a0 [ 1865.060727][T29158] ? tomoyo_file_ioctl+0x23/0x30 [ 1865.065687][T29158] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.071989][T29158] ? security_file_ioctl+0x8d/0xc0 16:02:43 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1865.077116][T29158] ksys_ioctl+0xab/0xd0 [ 1865.081281][T29158] __x64_sys_ioctl+0x73/0xb0 [ 1865.085882][T29158] do_syscall_64+0xfd/0x6a0 [ 1865.090403][T29158] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1865.096296][T29158] RIP: 0033:0x459829 [ 1865.100202][T29158] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1865.119820][T29158] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1865.128260][T29158] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1865.136246][T29158] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1865.144238][T29158] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1865.152219][T29158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1865.160207][T29158] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1865.278287][T29183] FAULT_INJECTION: forcing a failure. [ 1865.278287][T29183] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.291152][T29183] CPU: 1 PID: 29183 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1865.298825][T29183] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1865.308892][T29183] Call Trace: [ 1865.312199][T29183] dump_stack+0x16f/0x1f0 [ 1865.316551][T29183] should_fail.cold+0xa/0x15 [ 1865.321209][T29183] ? fault_create_debugfs_attr+0x180/0x180 [ 1865.327043][T29183] __should_failslab+0x121/0x190 [ 1865.331999][T29183] should_failslab+0x9/0x14 [ 1865.336523][T29183] kmem_cache_alloc+0x298/0x700 [ 1865.341407][T29183] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1865.347166][T29183] ? __vm_enough_memory+0x17e/0x3a0 [ 1865.352395][T29183] vm_area_dup+0x21/0x170 [ 1865.356778][T29183] dup_mm+0x549/0x1430 [ 1865.360885][T29183] ? vm_area_dup+0x170/0x170 [ 1865.365504][T29183] ? debug_mutex_init+0x2d/0x5a [ 1865.370401][T29183] copy_process+0x26fb/0x6880 [ 1865.375126][T29183] ? get_pid_task+0xcb/0x190 [ 1865.379754][T29183] ? __cleanup_sighand+0x60/0x60 [ 1865.384713][T29183] ? __f_unlock_pos+0x19/0x20 [ 1865.389420][T29183] ? lock_downgrade+0x920/0x920 [ 1865.394286][T29183] ? vfs_write+0x34c/0x5d0 [ 1865.398721][T29183] _do_fork+0x146/0xf60 [ 1865.402901][T29183] ? copy_init_mm+0x20/0x20 [ 1865.407426][T29183] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1865.412997][T29183] ? wait_for_completion+0x440/0x440 [ 1865.418332][T29183] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1865.424592][T29183] __x64_sys_clone+0x18d/0x250 [ 1865.429376][T29183] ? ksys_write+0x1cf/0x290 [ 1865.433909][T29183] ? __ia32_sys_vfork+0xc0/0xc0 [ 1865.438779][T29183] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1865.444085][T29183] ? trace_hardirqs_on+0x67/0x220 [ 1865.449142][T29183] do_syscall_64+0xfd/0x6a0 [ 1865.453668][T29183] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1865.459563][T29183] RIP: 0033:0x459829 16:02:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) listen(r0, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x2c00, 0x0) syz_open_dev$radio(0x0, 0x1, 0x2) syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') close(0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) socket$rxrpc(0x21, 0x2, 0x0) 16:02:44 executing program 5 (fault-call:4 fault-nth:21): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480060001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1865.463507][T29183] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1865.483214][T29183] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1865.483229][T29183] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1865.483237][T29183] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1865.483244][T29183] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1865.483252][T29183] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1865.483260][T29183] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000f001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1865.617730][T29291] FAULT_INJECTION: forcing a failure. [ 1865.617730][T29291] name failslab, interval 1, probability 0, space 0, times 0 [ 1865.630543][T29291] CPU: 1 PID: 29291 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1865.638275][T29291] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1865.648341][T29291] Call Trace: [ 1865.651648][T29291] dump_stack+0x16f/0x1f0 [ 1865.655998][T29291] should_fail.cold+0xa/0x15 [ 1865.660607][T29291] ? fault_create_debugfs_attr+0x180/0x180 [ 1865.666449][T29291] __should_failslab+0x121/0x190 [ 1865.671407][T29291] should_failslab+0x9/0x14 [ 1865.675972][T29291] kmem_cache_alloc_trace+0x2c3/0x770 [ 1865.681363][T29291] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1865.686665][T29291] ? trace_hardirqs_on+0x67/0x220 [ 1865.691701][T29291] ? __kasan_check_read+0x11/0x20 [ 1865.696762][T29291] wb_congested_get_create+0x18d/0x3a0 [ 1865.702239][T29291] wb_init+0x4b3/0x780 [ 1865.706329][T29291] bdi_init+0x2a1/0x420 [ 1865.710500][T29291] bdi_alloc_node+0x9f/0x100 [ 1865.715108][T29291] blk_alloc_queue_node+0x15d/0x780 [ 1865.720326][T29291] blk_mq_init_queue+0x4a/0xb0 [ 1865.725104][T29291] loop_add+0x2dd/0x8d0 [ 1865.729280][T29291] ? idr_find+0x47/0x60 [ 1865.733459][T29291] loop_control_ioctl+0x165/0x360 [ 1865.738590][T29291] ? loop_add+0x8d0/0x8d0 [ 1865.742946][T29291] ? loop_add+0x8d0/0x8d0 [ 1865.747291][T29291] do_vfs_ioctl+0xdb6/0x13e0 [ 1865.751907][T29291] ? ioctl_preallocate+0x210/0x210 [ 1865.757034][T29291] ? __fget+0x388/0x560 [ 1865.761204][T29291] ? ksys_dup3+0x3e0/0x3e0 [ 1865.765645][T29291] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1865.771903][T29291] ? fput_many+0x12c/0x1a0 [ 1865.776332][T29291] ? tomoyo_file_ioctl+0x23/0x30 [ 1865.781282][T29291] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1865.787545][T29291] ? security_file_ioctl+0x8d/0xc0 [ 1865.792681][T29291] ksys_ioctl+0xab/0xd0 [ 1865.796856][T29291] __x64_sys_ioctl+0x73/0xb0 [ 1865.801465][T29291] do_syscall_64+0xfd/0x6a0 [ 1865.805984][T29291] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1865.811909][T29291] RIP: 0033:0x459829 16:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:44 executing program 3 (fault-call:3 fault-nth:20): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:44 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48ea6e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480060001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000bf) [ 1865.815812][T29291] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1865.835436][T29291] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1865.843871][T29291] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1865.851877][T29291] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1865.859855][T29291] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:02:44 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1865.867832][T29291] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1865.876303][T29291] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:44 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800f0001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:44 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000bf) [ 1866.111473][T29476] FAULT_INJECTION: forcing a failure. [ 1866.111473][T29476] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.124381][T29476] CPU: 1 PID: 29476 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1866.132030][T29476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1866.142103][T29476] Call Trace: [ 1866.145415][T29476] dump_stack+0x16f/0x1f0 [ 1866.149765][T29476] should_fail.cold+0xa/0x15 [ 1866.154373][T29476] ? fault_create_debugfs_attr+0x180/0x180 [ 1866.160206][T29476] ? find_held_lock+0x35/0x130 [ 1866.165017][T29476] ? memcg_kmem_put_cache+0xaf/0x1b0 [ 1866.170319][T29476] __should_failslab+0x121/0x190 [ 1866.175278][T29476] should_failslab+0x9/0x14 [ 1866.179795][T29476] kmem_cache_alloc+0x47/0x700 [ 1866.184596][T29476] anon_vma_clone+0xde/0x480 [ 1866.189215][T29476] anon_vma_fork+0x8f/0x4a0 [ 1866.193831][T29476] ? dup_userfaultfd+0x15e/0x6d0 [ 1866.198788][T29476] ? memcpy+0x46/0x50 [ 1866.202789][T29476] dup_mm+0xa47/0x1430 [ 1866.206883][T29476] ? vm_area_dup+0x170/0x170 [ 1866.211487][T29476] ? debug_mutex_init+0x2d/0x5a [ 1866.216364][T29476] copy_process+0x26fb/0x6880 [ 1866.221052][T29476] ? get_pid_task+0xcb/0x190 [ 1866.225684][T29476] ? __cleanup_sighand+0x60/0x60 [ 1866.230670][T29476] ? __f_unlock_pos+0x19/0x20 [ 1866.235370][T29476] ? lock_downgrade+0x920/0x920 [ 1866.240233][T29476] ? vfs_write+0x34c/0x5d0 [ 1866.244668][T29476] _do_fork+0x146/0xf60 [ 1866.248851][T29476] ? copy_init_mm+0x20/0x20 [ 1866.253378][T29476] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1866.258946][T29476] ? wait_for_completion+0x440/0x440 [ 1866.264250][T29476] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1866.270508][T29476] __x64_sys_clone+0x18d/0x250 [ 1866.275282][T29476] ? ksys_write+0x1cf/0x290 [ 1866.279801][T29476] ? __ia32_sys_vfork+0xc0/0xc0 [ 1866.284668][T29476] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1866.289971][T29476] ? trace_hardirqs_on+0x67/0x220 [ 1866.295020][T29476] do_syscall_64+0xfd/0x6a0 [ 1866.299541][T29476] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1866.305445][T29476] RIP: 0033:0x459829 16:02:45 executing program 5 (fault-call:4 fault-nth:22): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) 16:02:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000a1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) r1 = syz_open_procfs(0x0, 0x0) sendfile(r0, r1, 0x0, 0x800000bf) 16:02:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480ec0001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1866.309349][T29476] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1866.328961][T29476] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1866.337378][T29476] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1866.345357][T29476] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1866.353340][T29476] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1866.361319][T29476] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1866.369294][T29476] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1866.549957][T29628] FAULT_INJECTION: forcing a failure. [ 1866.549957][T29628] name failslab, interval 1, probability 0, space 0, times 0 [ 1866.562716][T29628] CPU: 1 PID: 29628 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1866.570359][T29628] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1866.580427][T29628] Call Trace: [ 1866.583742][T29628] dump_stack+0x16f/0x1f0 [ 1866.588097][T29628] should_fail.cold+0xa/0x15 [ 1866.592714][T29628] ? fault_create_debugfs_attr+0x180/0x180 16:02:45 executing program 3 (fault-call:3 fault-nth:21): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x800000bf) 16:02:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1866.598551][T29628] __should_failslab+0x121/0x190 [ 1866.603506][T29628] should_failslab+0x9/0x14 [ 1866.608023][T29628] kmem_cache_alloc_node_trace+0x269/0x730 [ 1866.613842][T29628] ? pcpu_create_chunk+0x7b0/0x7b0 [ 1866.618974][T29628] blkg_alloc+0x93/0x790 [ 1866.623327][T29628] blkcg_init_queue+0x27/0x380 [ 1866.628103][T29628] blk_alloc_queue_node+0x55c/0x780 [ 1866.633316][T29628] blk_mq_init_queue+0x4a/0xb0 [ 1866.638094][T29628] loop_add+0x2dd/0x8d0 [ 1866.642263][T29628] ? idr_find+0x47/0x60 16:02:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="486eea001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1866.646445][T29628] loop_control_ioctl+0x165/0x360 [ 1866.651481][T29628] ? loop_add+0x8d0/0x8d0 [ 1866.655832][T29628] ? loop_add+0x8d0/0x8d0 [ 1866.660181][T29628] do_vfs_ioctl+0xdb6/0x13e0 [ 1866.664825][T29628] ? ioctl_preallocate+0x210/0x210 [ 1866.669947][T29628] ? __fget+0x388/0x560 [ 1866.674118][T29628] ? ksys_dup3+0x3e0/0x3e0 [ 1866.678542][T29628] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1866.684794][T29628] ? fput_many+0x12c/0x1a0 [ 1866.689265][T29628] ? tomoyo_file_ioctl+0x23/0x30 [ 1866.694221][T29628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 16:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) [ 1866.700471][T29628] ? security_file_ioctl+0x8d/0xc0 [ 1866.705598][T29628] ksys_ioctl+0xab/0xd0 [ 1866.709785][T29628] __x64_sys_ioctl+0x73/0xb0 [ 1866.714393][T29628] do_syscall_64+0xfd/0x6a0 [ 1866.718912][T29628] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1866.724807][T29628] RIP: 0033:0x459829 [ 1866.728712][T29628] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x800000bf) [ 1866.748893][T29628] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1866.757315][T29628] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1866.772071][T29628] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1866.780053][T29628] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1866.788030][T29628] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1866.796011][T29628] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1867.017164][T29727] FAULT_INJECTION: forcing a failure. [ 1867.017164][T29727] name failslab, interval 1, probability 0, space 0, times 0 [ 1867.030394][T29727] CPU: 1 PID: 29727 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1867.038044][T29727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.048108][T29727] Call Trace: [ 1867.051427][T29727] dump_stack+0x16f/0x1f0 [ 1867.055791][T29727] should_fail.cold+0xa/0x15 [ 1867.060420][T29727] ? fault_create_debugfs_attr+0x180/0x180 16:02:45 executing program 5 (fault-call:4 fault-nth:23): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:45 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800c00e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:45 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) 16:02:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:45 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800f0001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1867.066248][T29727] ? __anon_vma_interval_tree_augment_rotate+0x1ac/0x220 [ 1867.073297][T29727] __should_failslab+0x121/0x190 [ 1867.078261][T29727] should_failslab+0x9/0x14 [ 1867.082792][T29727] kmem_cache_alloc+0x47/0x700 [ 1867.087582][T29727] ? anon_vma_chain_link+0x154/0x1c0 [ 1867.092897][T29727] anon_vma_clone+0xde/0x480 [ 1867.097516][T29727] anon_vma_fork+0x8f/0x4a0 [ 1867.102037][T29727] ? dup_userfaultfd+0x15e/0x6d0 [ 1867.106988][T29727] ? memcpy+0x46/0x50 [ 1867.110992][T29727] dup_mm+0xa47/0x1430 [ 1867.115095][T29727] ? vm_area_dup+0x170/0x170 [ 1867.119703][T29727] ? debug_mutex_init+0x2d/0x5a [ 1867.124596][T29727] copy_process+0x26fb/0x6880 [ 1867.129288][T29727] ? get_pid_task+0xcb/0x190 [ 1867.133911][T29727] ? __cleanup_sighand+0x60/0x60 [ 1867.139071][T29727] ? __f_unlock_pos+0x19/0x20 [ 1867.143770][T29727] ? lock_downgrade+0x920/0x920 [ 1867.148627][T29727] ? vfs_write+0x34c/0x5d0 [ 1867.153055][T29727] _do_fork+0x146/0xf60 [ 1867.157219][T29727] ? copy_init_mm+0x20/0x20 [ 1867.161726][T29727] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1867.167282][T29727] ? wait_for_completion+0x440/0x440 [ 1867.172588][T29727] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1867.178845][T29727] __x64_sys_clone+0x18d/0x250 [ 1867.183621][T29727] ? ksys_write+0x1cf/0x290 [ 1867.188141][T29727] ? __ia32_sys_vfork+0xc0/0xc0 [ 1867.193007][T29727] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1867.198304][T29727] ? trace_hardirqs_on+0x67/0x220 [ 1867.203344][T29727] do_syscall_64+0xfd/0x6a0 [ 1867.207860][T29727] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1867.213756][T29727] RIP: 0033:0x459829 [ 1867.217656][T29727] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1867.237267][T29727] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1867.245693][T29727] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1867.253670][T29727] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1867.261740][T29727] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1867.269720][T29727] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1867.273379][T29790] FAULT_INJECTION: forcing a failure. [ 1867.273379][T29790] name failslab, interval 1, probability 0, space 0, times 0 [ 1867.277708][T29727] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1867.298459][T29790] CPU: 0 PID: 29790 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1867.306095][T29790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.316154][T29790] Call Trace: [ 1867.319458][T29790] dump_stack+0x16f/0x1f0 [ 1867.323795][T29790] should_fail.cold+0xa/0x15 [ 1867.328391][T29790] ? fault_create_debugfs_attr+0x180/0x180 [ 1867.334211][T29790] __should_failslab+0x121/0x190 [ 1867.339155][T29790] should_failslab+0x9/0x14 [ 1867.343681][T29790] kmem_cache_alloc_node_trace+0x269/0x730 [ 1867.349518][T29790] ? pcpu_create_chunk+0x7b0/0x7b0 [ 1867.354645][T29790] blkg_alloc+0x93/0x790 [ 1867.358897][T29790] blkcg_init_queue+0x27/0x380 [ 1867.363675][T29790] blk_alloc_queue_node+0x55c/0x780 [ 1867.368887][T29790] blk_mq_init_queue+0x4a/0xb0 [ 1867.373669][T29790] loop_add+0x2dd/0x8d0 [ 1867.377833][T29790] ? idr_find+0x47/0x60 [ 1867.381993][T29790] loop_control_ioctl+0x165/0x360 [ 1867.387021][T29790] ? loop_add+0x8d0/0x8d0 [ 1867.391359][T29790] ? loop_add+0x8d0/0x8d0 [ 1867.395698][T29790] do_vfs_ioctl+0xdb6/0x13e0 [ 1867.400312][T29790] ? ioctl_preallocate+0x210/0x210 [ 1867.405436][T29790] ? __fget+0x388/0x560 [ 1867.409606][T29790] ? ksys_dup3+0x3e0/0x3e0 [ 1867.414037][T29790] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1867.420286][T29790] ? fput_many+0x12c/0x1a0 [ 1867.424713][T29790] ? tomoyo_file_ioctl+0x23/0x30 [ 1867.429652][T29790] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1867.435890][T29790] ? security_file_ioctl+0x8d/0xc0 [ 1867.441004][T29790] ksys_ioctl+0xab/0xd0 [ 1867.445161][T29790] __x64_sys_ioctl+0x73/0xb0 [ 1867.449753][T29790] do_syscall_64+0xfd/0x6a0 [ 1867.454260][T29790] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1867.460163][T29790] RIP: 0033:0x459829 [ 1867.464065][T29790] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1867.483679][T29790] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1867.492117][T29790] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1867.500097][T29790] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1867.508071][T29790] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:02:46 executing program 3 (fault-call:3 fault-nth:22): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1867.516066][T29790] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1867.524046][T29790] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1867.670323][T29875] FAULT_INJECTION: forcing a failure. [ 1867.670323][T29875] name failslab, interval 1, probability 0, space 0, times 0 [ 1867.683177][T29875] CPU: 1 PID: 29875 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1867.690822][T29875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.700891][T29875] Call Trace: [ 1867.704209][T29875] dump_stack+0x16f/0x1f0 [ 1867.708559][T29875] should_fail.cold+0xa/0x15 [ 1867.713182][T29875] ? fault_create_debugfs_attr+0x180/0x180 16:02:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800451e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1867.719036][T29875] __should_failslab+0x121/0x190 [ 1867.724011][T29875] should_failslab+0x9/0x14 [ 1867.728535][T29875] kmem_cache_alloc+0x47/0x700 [ 1867.733319][T29875] ? anon_vma_chain_link+0x154/0x1c0 [ 1867.738630][T29875] anon_vma_clone+0xde/0x480 [ 1867.743240][T29875] anon_vma_fork+0x8f/0x4a0 [ 1867.747761][T29875] ? dup_userfaultfd+0x15e/0x6d0 [ 1867.752708][T29875] ? memcpy+0x46/0x50 [ 1867.756713][T29875] dup_mm+0xa47/0x1430 [ 1867.760813][T29875] ? vm_area_dup+0x170/0x170 [ 1867.765431][T29875] ? debug_mutex_init+0x2d/0x5a 16:02:46 executing program 5 (fault-call:4 fault-nth:24): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1867.770308][T29875] copy_process+0x26fb/0x6880 [ 1867.774995][T29875] ? get_pid_task+0xcb/0x190 [ 1867.775027][T29875] ? __cleanup_sighand+0x60/0x60 [ 1867.775051][T29875] ? __f_unlock_pos+0x19/0x20 [ 1867.784562][T29875] ? lock_downgrade+0x920/0x920 [ 1867.784576][T29875] ? vfs_write+0x34c/0x5d0 [ 1867.784594][T29875] _do_fork+0x146/0xf60 [ 1867.784612][T29875] ? copy_init_mm+0x20/0x20 [ 1867.784633][T29875] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1867.812717][T29875] ? wait_for_completion+0x440/0x440 [ 1867.818028][T29875] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1867.824297][T29875] __x64_sys_clone+0x18d/0x250 [ 1867.829088][T29875] ? ksys_write+0x1cf/0x290 [ 1867.833613][T29875] ? __ia32_sys_vfork+0xc0/0xc0 [ 1867.838486][T29875] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1867.843778][T29875] ? trace_hardirqs_on+0x67/0x220 [ 1867.843800][T29875] do_syscall_64+0xfd/0x6a0 [ 1867.843823][T29875] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1867.853318][T29875] RIP: 0033:0x459829 [ 1867.853334][T29875] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1867.853341][T29875] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1867.853354][T29875] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1867.853362][T29875] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1867.853371][T29875] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 16:02:46 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800003f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40, 0xf0e2915fd408bbf9}], 0x1, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs, 0x8) syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) [ 1867.853386][T29875] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1867.923019][T29875] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1867.959777][T29884] FAULT_INJECTION: forcing a failure. [ 1867.959777][T29884] name failslab, interval 1, probability 0, space 0, times 0 [ 1867.972604][T29884] CPU: 0 PID: 29884 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1867.980248][T29884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1867.990314][T29884] Call Trace: [ 1867.993627][T29884] dump_stack+0x16f/0x1f0 [ 1867.997993][T29884] should_fail.cold+0xa/0x15 [ 1868.002607][T29884] ? fault_create_debugfs_attr+0x180/0x180 [ 1868.008444][T29884] __should_failslab+0x121/0x190 [ 1868.013402][T29884] should_failslab+0x9/0x14 [ 1868.017925][T29884] kmem_cache_alloc_trace+0x2c3/0x770 [ 1868.023319][T29884] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1868.028617][T29884] ? trace_hardirqs_on+0x67/0x220 [ 1868.033664][T29884] ? __kasan_check_read+0x11/0x20 [ 1868.038712][T29884] wb_congested_get_create+0x18d/0x3a0 [ 1868.044186][T29884] wb_init+0x4b3/0x780 [ 1868.048284][T29884] bdi_init+0x2a1/0x420 [ 1868.052464][T29884] bdi_alloc_node+0x9f/0x100 [ 1868.057063][T29884] blk_alloc_queue_node+0x15d/0x780 [ 1868.062276][T29884] blk_mq_init_queue+0x4a/0xb0 [ 1868.067054][T29884] loop_add+0x2dd/0x8d0 [ 1868.071220][T29884] ? idr_find+0x47/0x60 [ 1868.075384][T29884] loop_control_ioctl+0x165/0x360 [ 1868.080420][T29884] ? loop_add+0x8d0/0x8d0 [ 1868.084767][T29884] ? loop_add+0x8d0/0x8d0 [ 1868.089102][T29884] do_vfs_ioctl+0xdb6/0x13e0 [ 1868.093701][T29884] ? ioctl_preallocate+0x210/0x210 [ 1868.098823][T29884] ? __fget+0x388/0x560 [ 1868.102995][T29884] ? ksys_dup3+0x3e0/0x3e0 [ 1868.107429][T29884] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1868.113677][T29884] ? fput_many+0x12c/0x1a0 [ 1868.118141][T29884] ? tomoyo_file_ioctl+0x23/0x30 [ 1868.123120][T29884] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.129369][T29884] ? security_file_ioctl+0x8d/0xc0 [ 1868.134491][T29884] ksys_ioctl+0xab/0xd0 [ 1868.138652][T29884] __x64_sys_ioctl+0x73/0xb0 [ 1868.143245][T29884] do_syscall_64+0xfd/0x6a0 [ 1868.147757][T29884] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.153651][T29884] RIP: 0033:0x459829 16:02:46 executing program 3 (fault-call:3 fault-nth:23): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:46 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000022300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:46 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) stat(&(0x7f0000000300)='./file0\x00', 0x0) sendmmsg$unix(r0, &(0x7f0000000400)=[{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0e2915fd408bbf9}], 0x1, 0x40094) bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@abs={0x1}, 0x8) r1 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/ipv6_route\x00') sendfile(r0, r1, 0x0, 0x800000bf) [ 1868.157557][T29884] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1868.177174][T29884] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1868.185598][T29884] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1868.193586][T29884] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1868.201562][T29884] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1868.209534][T29884] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1868.217515][T29884] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000401400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.345251][T30026] FAULT_INJECTION: forcing a failure. [ 1868.345251][T30026] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.358133][T30026] CPU: 0 PID: 30026 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1868.365771][T30026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1868.375829][T30026] Call Trace: [ 1868.379144][T30026] dump_stack+0x16f/0x1f0 [ 1868.383531][T30026] should_fail.cold+0xa/0x15 [ 1868.388146][T30026] ? fault_create_debugfs_attr+0x180/0x180 16:02:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:47 executing program 5 (fault-call:4 fault-nth:25): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1868.394026][T30026] __should_failslab+0x121/0x190 [ 1868.399006][T30026] should_failslab+0x9/0x14 [ 1868.403523][T30026] kmem_cache_alloc+0x298/0x700 [ 1868.408472][T30026] ? anon_vma_clone+0x320/0x480 [ 1868.413337][T30026] anon_vma_fork+0xfc/0x4a0 [ 1868.417854][T30026] ? dup_userfaultfd+0x15e/0x6d0 [ 1868.422800][T30026] ? memcpy+0x46/0x50 [ 1868.426801][T30026] dup_mm+0xa47/0x1430 [ 1868.430920][T30026] ? vm_area_dup+0x170/0x170 [ 1868.435529][T30026] ? debug_mutex_init+0x2d/0x5a [ 1868.440435][T30026] copy_process+0x26fb/0x6880 16:02:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.445162][T30026] ? get_pid_task+0xcb/0x190 [ 1868.449820][T30026] ? __cleanup_sighand+0x60/0x60 [ 1868.454780][T30026] ? __f_unlock_pos+0x19/0x20 [ 1868.459479][T30026] ? lock_downgrade+0x920/0x920 [ 1868.464347][T30026] ? vfs_write+0x34c/0x5d0 [ 1868.468780][T30026] _do_fork+0x146/0xf60 [ 1868.472953][T30026] ? copy_init_mm+0x20/0x20 [ 1868.477464][T30026] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1868.483119][T30026] ? wait_for_completion+0x440/0x440 [ 1868.488440][T30026] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 16:02:47 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48001e451400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.494706][T30026] __x64_sys_clone+0x18d/0x250 [ 1868.499490][T30026] ? ksys_write+0x1cf/0x290 [ 1868.504011][T30026] ? __ia32_sys_vfork+0xc0/0xc0 [ 1868.508893][T30026] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1868.514205][T30026] ? trace_hardirqs_on+0x67/0x220 [ 1868.519249][T30026] do_syscall_64+0xfd/0x6a0 [ 1868.523785][T30026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.529690][T30026] RIP: 0033:0x459829 [ 1868.533595][T30026] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1868.553296][T30026] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1868.561720][T30026] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1868.569695][T30026] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1868.577842][T30026] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1868.585850][T30026] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.593842][T30026] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1868.688198][T30134] FAULT_INJECTION: forcing a failure. [ 1868.688198][T30134] name failslab, interval 1, probability 0, space 0, times 0 [ 1868.700897][T30134] CPU: 0 PID: 30134 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1868.708543][T30134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1868.718639][T30134] Call Trace: [ 1868.721948][T30134] dump_stack+0x16f/0x1f0 [ 1868.726314][T30134] should_fail.cold+0xa/0x15 [ 1868.730939][T30134] ? fault_create_debugfs_attr+0x180/0x180 16:02:47 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.736776][T30134] __should_failslab+0x121/0x190 [ 1868.741738][T30134] should_failslab+0x9/0x14 [ 1868.747748][T30134] kmem_cache_alloc_trace+0x2c3/0x770 [ 1868.753142][T30134] ? lock_downgrade+0x920/0x920 [ 1868.758014][T30134] ? blkcg_init_queue+0x106/0x380 [ 1868.766471][T30134] ? _raw_spin_unlock_irq+0x28/0x70 [ 1868.772470][T30134] blk_iolatency_init+0x4e/0x2f0 [ 1868.777434][T30134] blkcg_init_queue+0x18b/0x380 [ 1868.782304][T30134] blk_alloc_queue_node+0x55c/0x780 [ 1868.787525][T30134] blk_mq_init_queue+0x4a/0xb0 [ 1868.792304][T30134] loop_add+0x2dd/0x8d0 [ 1868.796467][T30134] ? idr_find+0x47/0x60 [ 1868.800633][T30134] loop_control_ioctl+0x165/0x360 [ 1868.805678][T30134] ? loop_add+0x8d0/0x8d0 [ 1868.810018][T30134] ? loop_add+0x8d0/0x8d0 [ 1868.814360][T30134] do_vfs_ioctl+0xdb6/0x13e0 [ 1868.818958][T30134] ? ioctl_preallocate+0x210/0x210 [ 1868.824073][T30134] ? __fget+0x388/0x560 [ 1868.828239][T30134] ? ksys_dup3+0x3e0/0x3e0 [ 1868.832676][T30134] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 16:02:47 executing program 3 (fault-call:3 fault-nth:24): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000601400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:47 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000ec000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.838933][T30134] ? fput_many+0x12c/0x1a0 [ 1868.843363][T30134] ? tomoyo_file_ioctl+0x23/0x30 [ 1868.848315][T30134] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1868.854659][T30134] ? security_file_ioctl+0x8d/0xc0 [ 1868.859778][T30134] ksys_ioctl+0xab/0xd0 [ 1868.863966][T30134] __x64_sys_ioctl+0x73/0xb0 [ 1868.868575][T30134] do_syscall_64+0xfd/0x6a0 [ 1868.873098][T30134] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1868.879488][T30134] RIP: 0033:0x459829 16:02:47 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.883386][T30134] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1868.903187][T30134] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1868.911620][T30134] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1868.919595][T30134] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1868.927570][T30134] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:02:47 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1868.935539][T30134] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1868.943510][T30134] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:47 executing program 4: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:47 executing program 5 (fault-call:4 fault-nth:26): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1869.083613][T30237] FAULT_INJECTION: forcing a failure. [ 1869.083613][T30237] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.096467][T30237] CPU: 0 PID: 30237 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1869.104111][T30237] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1869.114212][T30237] Call Trace: [ 1869.117514][T30237] dump_stack+0x16f/0x1f0 [ 1869.121864][T30237] should_fail.cold+0xa/0x15 [ 1869.126475][T30237] ? fault_create_debugfs_attr+0x180/0x180 16:02:47 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000ec01400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1869.132312][T30237] __should_failslab+0x121/0x190 [ 1869.137295][T30237] should_failslab+0x9/0x14 [ 1869.141818][T30237] kmem_cache_alloc+0x47/0x700 [ 1869.146608][T30237] ? anon_vma_chain_link+0x154/0x1c0 [ 1869.151938][T30237] anon_vma_clone+0xde/0x480 [ 1869.156588][T30237] anon_vma_fork+0x8f/0x4a0 [ 1869.161146][T30237] ? dup_userfaultfd+0x15e/0x6d0 [ 1869.166100][T30237] ? memcpy+0x46/0x50 [ 1869.170107][T30237] dup_mm+0xa47/0x1430 [ 1869.174219][T30237] ? vm_area_dup+0x170/0x170 [ 1869.178839][T30237] ? debug_mutex_init+0x2d/0x5a [ 1869.183722][T30237] copy_process+0x26fb/0x6880 [ 1869.188428][T30237] ? get_pid_task+0xcb/0x190 [ 1869.193059][T30237] ? __cleanup_sighand+0x60/0x60 [ 1869.198021][T30237] ? __f_unlock_pos+0x19/0x20 [ 1869.202740][T30237] ? lock_downgrade+0x920/0x920 [ 1869.203359][T30309] FAULT_INJECTION: forcing a failure. [ 1869.203359][T30309] name failslab, interval 1, probability 0, space 0, times 0 [ 1869.207616][T30237] ? vfs_write+0x34c/0x5d0 [ 1869.224607][T30237] _do_fork+0x146/0xf60 [ 1869.228771][T30237] ? copy_init_mm+0x20/0x20 [ 1869.233273][T30237] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1869.238827][T30237] ? wait_for_completion+0x440/0x440 [ 1869.244121][T30237] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1869.250388][T30237] __x64_sys_clone+0x18d/0x250 [ 1869.255154][T30237] ? ksys_write+0x1cf/0x290 [ 1869.259656][T30237] ? __ia32_sys_vfork+0xc0/0xc0 [ 1869.264520][T30237] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1869.269810][T30237] ? trace_hardirqs_on+0x67/0x220 [ 1869.274836][T30237] do_syscall_64+0xfd/0x6a0 [ 1869.279347][T30237] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1869.285237][T30237] RIP: 0033:0x459829 [ 1869.289127][T30237] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1869.308734][T30237] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1869.317157][T30237] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1869.325142][T30237] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1869.333119][T30237] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1869.341113][T30237] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1869.349096][T30237] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1869.357085][T30309] CPU: 1 PID: 30309 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1869.364717][T30309] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1869.364729][T30309] Call Trace: [ 1869.378244][T30309] dump_stack+0x16f/0x1f0 [ 1869.382581][T30309] should_fail.cold+0xa/0x15 [ 1869.387179][T30309] ? fault_create_debugfs_attr+0x180/0x180 [ 1869.393001][T30309] __should_failslab+0x121/0x190 [ 1869.397958][T30309] should_failslab+0x9/0x14 [ 1869.402473][T30309] kmem_cache_alloc_trace+0x2c3/0x770 [ 1869.407855][T30309] ? lock_downgrade+0x920/0x920 [ 1869.412709][T30309] ? blkcg_init_queue+0x106/0x380 [ 1869.412727][T30309] ? _raw_spin_unlock_irq+0x28/0x70 [ 1869.412747][T30309] blk_iolatency_init+0x4e/0x2f0 [ 1869.422956][T30309] blkcg_init_queue+0x18b/0x380 [ 1869.422973][T30309] blk_alloc_queue_node+0x55c/0x780 [ 1869.422993][T30309] blk_mq_init_queue+0x4a/0xb0 [ 1869.442689][T30309] loop_add+0x2dd/0x8d0 [ 1869.446851][T30309] ? idr_find+0x47/0x60 [ 1869.451025][T30309] loop_control_ioctl+0x165/0x360 [ 1869.456091][T30309] ? loop_add+0x8d0/0x8d0 [ 1869.460435][T30309] ? loop_add+0x8d0/0x8d0 [ 1869.464773][T30309] do_vfs_ioctl+0xdb6/0x13e0 [ 1869.469370][T30309] ? ioctl_preallocate+0x210/0x210 [ 1869.474482][T30309] ? __fget+0x388/0x560 [ 1869.478654][T30309] ? ksys_dup3+0x3e0/0x3e0 [ 1869.483080][T30309] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1869.489331][T30309] ? fput_many+0x12c/0x1a0 [ 1869.493764][T30309] ? tomoyo_file_ioctl+0x23/0x30 [ 1869.498720][T30309] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1869.504969][T30309] ? security_file_ioctl+0x8d/0xc0 [ 1869.510095][T30309] ksys_ioctl+0xab/0xd0 [ 1869.514261][T30309] __x64_sys_ioctl+0x73/0xb0 [ 1869.518862][T30309] do_syscall_64+0xfd/0x6a0 [ 1869.523394][T30309] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1869.529286][T30309] RIP: 0033:0x459829 [ 1869.533180][T30309] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1869.552792][T30309] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1869.561218][T30309] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1869.569195][T30309] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1869.577172][T30309] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 16:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000f01400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480002001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 3 (fault-call:3 fault-nth:25): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1869.585151][T30309] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1869.593133][T30309] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:48 executing program 0: writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1869.719295][T30361] FAULT_INJECTION: forcing a failure. [ 1869.719295][T30361] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1869.732828][T30361] CPU: 1 PID: 30361 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1869.740475][T30361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1869.750540][T30361] Call Trace: [ 1869.753853][T30361] dump_stack+0x16f/0x1f0 [ 1869.758205][T30361] should_fail.cold+0xa/0x15 [ 1869.762816][T30361] ? fault_create_debugfs_attr+0x180/0x180 16:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000000f00190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1869.768648][T30361] ? ___might_sleep+0x131/0x280 [ 1869.773527][T30361] should_fail_alloc_page+0x50/0x60 [ 1869.778740][T30361] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1869.784130][T30361] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1869.789869][T30361] ? save_stack+0x5c/0x90 [ 1869.794220][T30361] ? save_stack+0x23/0x90 [ 1869.798579][T30361] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1869.804866][T30361] alloc_pages_current+0x107/0x210 [ 1869.810003][T30361] get_zeroed_page+0x14/0x50 [ 1869.814619][T30361] __pud_alloc+0x3b/0x250 [ 1869.818975][T30361] pud_alloc+0xde/0x150 [ 1869.823146][T30361] copy_page_range+0x37a/0x1da0 [ 1869.828027][T30361] ? mark_held_locks+0xf0/0xf0 [ 1869.832814][T30361] ? anon_vma_fork+0x371/0x4a0 [ 1869.837602][T30361] ? dup_mm+0x7cd/0x1430 [ 1869.841862][T30361] ? dup_mm+0x776/0x1430 [ 1869.846135][T30361] ? pmd_alloc+0x180/0x180 [ 1869.850589][T30361] ? lock_downgrade+0x920/0x920 [ 1869.855485][T30361] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1869.861775][T30361] ? validate_mm_rb+0xa3/0xc0 16:02:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1869.866484][T30361] ? __vma_link_rb+0x275/0x370 [ 1869.871276][T30361] ? __kasan_check_write+0x14/0x20 [ 1869.876436][T30361] dup_mm+0xa67/0x1430 [ 1869.880571][T30361] ? vm_area_dup+0x170/0x170 [ 1869.885191][T30361] ? debug_mutex_init+0x2d/0x5a [ 1869.890073][T30361] copy_process+0x26fb/0x6880 [ 1869.895036][T30361] ? get_pid_task+0xcb/0x190 [ 1869.899684][T30361] ? __cleanup_sighand+0x60/0x60 [ 1869.904650][T30361] ? __f_unlock_pos+0x19/0x20 [ 1869.909368][T30361] ? lock_downgrade+0x920/0x920 [ 1869.914271][T30361] ? vfs_write+0x34c/0x5d0 16:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001200190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1869.918699][T30361] _do_fork+0x146/0xf60 [ 1869.922864][T30361] ? copy_init_mm+0x20/0x20 [ 1869.927376][T30361] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1869.932940][T30361] ? wait_for_completion+0x440/0x440 [ 1869.938246][T30361] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1869.944503][T30361] __x64_sys_clone+0x18d/0x250 [ 1869.949273][T30361] ? ksys_write+0x1cf/0x290 [ 1869.953793][T30361] ? __ia32_sys_vfork+0xc0/0xc0 [ 1869.958656][T30361] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1869.963948][T30361] ? trace_hardirqs_on+0x67/0x220 [ 1869.965337][T30471] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1869.968981][T30361] do_syscall_64+0xfd/0x6a0 [ 1869.969005][T30361] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1869.969026][T30361] RIP: 0033:0x459829 [ 1869.992575][T30361] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1870.012207][T30361] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 16:02:48 executing program 5 (fault-call:4 fault-nth:27): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480004001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:48 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1870.020625][T30361] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1870.028694][T30361] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1870.036669][T30361] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1870.044645][T30361] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1870.052621][T30361] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:48 executing program 4: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1870.193555][T30493] FAULT_INJECTION: forcing a failure. [ 1870.193555][T30493] name failslab, interval 1, probability 0, space 0, times 0 [ 1870.206551][T30493] CPU: 1 PID: 30493 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1870.209304][T30510] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1870.214194][T30493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1870.214204][T30493] Call Trace: [ 1870.214233][T30493] dump_stack+0x16f/0x1f0 [ 1870.214259][T30493] should_fail.cold+0xa/0x15 [ 1870.214289][T30493] ? fault_create_debugfs_attr+0x180/0x180 [ 1870.251638][T30493] __should_failslab+0x121/0x190 [ 1870.256867][T30493] should_failslab+0x9/0x14 [ 1870.261389][T30493] kmem_cache_alloc_node_trace+0x269/0x730 [ 1870.267207][T30493] ? lockdep_init_map+0x1be/0x6d0 [ 1870.272249][T30493] ? init_timer_key+0x13b/0x350 [ 1870.277109][T30493] blk_throtl_init+0x7d/0x680 [ 1870.281802][T30493] blkcg_init_queue+0x237/0x380 [ 1870.286665][T30493] blk_alloc_queue_node+0x55c/0x780 [ 1870.291868][T30493] blk_mq_init_queue+0x4a/0xb0 [ 1870.296637][T30493] loop_add+0x2dd/0x8d0 [ 1870.300791][T30493] ? idr_find+0x47/0x60 [ 1870.304949][T30493] loop_control_ioctl+0x165/0x360 [ 1870.309972][T30493] ? loop_add+0x8d0/0x8d0 [ 1870.314480][T30493] ? loop_add+0x8d0/0x8d0 [ 1870.318807][T30493] do_vfs_ioctl+0xdb6/0x13e0 [ 1870.323400][T30493] ? ioctl_preallocate+0x210/0x210 [ 1870.328510][T30493] ? __fget+0x388/0x560 [ 1870.332682][T30493] ? ksys_dup3+0x3e0/0x3e0 [ 1870.337095][T30493] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1870.343330][T30493] ? fput_many+0x12c/0x1a0 [ 1870.347761][T30493] ? tomoyo_file_ioctl+0x23/0x30 [ 1870.352707][T30493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1870.358957][T30493] ? security_file_ioctl+0x8d/0xc0 [ 1870.364076][T30493] ksys_ioctl+0xab/0xd0 [ 1870.368238][T30493] __x64_sys_ioctl+0x73/0xb0 [ 1870.372837][T30493] do_syscall_64+0xfd/0x6a0 [ 1870.377370][T30493] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1870.383282][T30493] RIP: 0033:0x459829 [ 1870.387181][T30493] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1870.406802][T30493] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1870.415222][T30493] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1870.423193][T30493] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1870.431165][T30493] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1870.439137][T30493] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1870.447117][T30493] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:49 executing program 3 (fault-call:3 fault-nth:26): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:49 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000021400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48000a001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1870.541236][T30593] netlink: 48 bytes leftover after parsing attributes in process `syz-executor.0'. 16:02:49 executing program 5 (fault-call:4 fault-nth:28): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:49 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000041400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:49 executing program 4: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1870.638883][T30598] FAULT_INJECTION: forcing a failure. [ 1870.638883][T30598] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1870.652407][T30598] CPU: 1 PID: 30598 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1870.660072][T30598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1870.670142][T30598] Call Trace: [ 1870.670178][T30598] dump_stack+0x16f/0x1f0 [ 1870.670201][T30598] should_fail.cold+0xa/0x15 [ 1870.670224][T30598] ? fault_create_debugfs_attr+0x180/0x180 [ 1870.670249][T30598] ? ___might_sleep+0x131/0x280 [ 1870.670275][T30598] should_fail_alloc_page+0x50/0x60 [ 1870.670298][T30598] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1870.703812][T30598] ? find_held_lock+0x35/0x130 [ 1870.708598][T30598] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1870.714338][T30598] ? lock_downgrade+0x920/0x920 [ 1870.719201][T30598] ? rwlock_bug.part.0+0x90/0x90 [ 1870.724144][T30598] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1870.730396][T30598] alloc_pages_current+0x107/0x210 [ 1870.735517][T30598] ? do_raw_spin_unlock+0x57/0x270 [ 1870.740637][T30598] __pmd_alloc+0x41/0x460 [ 1870.740650][T30598] ? __pmd+0x60/0x60 [ 1870.740667][T30598] pmd_alloc+0x10c/0x180 [ 1870.740687][T30598] copy_page_range+0x610/0x1da0 [ 1870.750405][T30598] ? pmd_alloc+0x180/0x180 [ 1870.769702][T30598] ? lock_downgrade+0x920/0x920 [ 1870.774570][T30598] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1870.780305][T30598] ? validate_mm_rb+0xa3/0xc0 [ 1870.784998][T30598] ? __vma_link_rb+0x275/0x370 [ 1870.789777][T30598] ? __kasan_check_write+0x14/0x20 [ 1870.794903][T30598] dup_mm+0xa67/0x1430 [ 1870.798279][T30605] FAULT_INJECTION: forcing a failure. [ 1870.798279][T30605] name failslab, interval 1, probability 0, space 0, times 0 [ 1870.798991][T30598] ? vm_area_dup+0x170/0x170 [ 1870.799013][T30598] ? debug_mutex_init+0x2d/0x5a [ 1870.799034][T30598] copy_process+0x26fb/0x6880 [ 1870.825939][T30598] ? get_pid_task+0xcb/0x190 [ 1870.830542][T30598] ? __cleanup_sighand+0x60/0x60 [ 1870.835479][T30598] ? __f_unlock_pos+0x19/0x20 [ 1870.840168][T30598] ? lock_downgrade+0x920/0x920 [ 1870.845017][T30598] ? vfs_write+0x34c/0x5d0 [ 1870.849443][T30598] _do_fork+0x146/0xf60 [ 1870.853601][T30598] ? copy_init_mm+0x20/0x20 [ 1870.858114][T30598] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1870.863660][T30598] ? wait_for_completion+0x440/0x440 [ 1870.868961][T30598] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1870.875708][T30598] __x64_sys_clone+0x18d/0x250 [ 1870.880487][T30598] ? ksys_write+0x1cf/0x290 [ 1870.884990][T30598] ? __ia32_sys_vfork+0xc0/0xc0 [ 1870.889848][T30598] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1870.895136][T30598] ? trace_hardirqs_on+0x67/0x220 [ 1870.900165][T30598] do_syscall_64+0xfd/0x6a0 [ 1870.904672][T30598] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1870.910557][T30598] RIP: 0033:0x459829 [ 1870.914448][T30598] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1870.934062][T30598] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1870.942483][T30598] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1870.950457][T30598] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1870.958429][T30598] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1870.966409][T30598] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1870.974417][T30598] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1870.982420][T30605] CPU: 0 PID: 30605 Comm: syz-executor.5 Not tainted 5.2.0+ #71 16:02:49 executing program 0: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1870.990060][T30605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1871.000127][T30605] Call Trace: [ 1871.003426][T30605] dump_stack+0x16f/0x1f0 [ 1871.007764][T30605] should_fail.cold+0xa/0x15 [ 1871.012375][T30605] ? fault_create_debugfs_attr+0x180/0x180 [ 1871.018201][T30605] __should_failslab+0x121/0x190 [ 1871.023240][T30605] should_failslab+0x9/0x14 [ 1871.027749][T30605] kmem_cache_alloc_node_trace+0x5a/0x730 [ 1871.033472][T30605] ? do_raw_spin_lock+0x12a/0x2e0 [ 1871.038535][T30605] ? rwlock_bug.part.0+0x90/0x90 [ 1871.043484][T30605] ? lock_acquire+0x190/0x400 [ 1871.048176][T30605] iolatency_pd_alloc+0x8d/0x140 [ 1871.053223][T30605] ? iolatency_clear_scaling.isra.0+0x180/0x180 [ 1871.059477][T30605] blkcg_activate_policy+0x26a/0x5a0 [ 1871.064799][T30605] blk_iolatency_init+0x151/0x2f0 [ 1871.069902][T30605] blkcg_init_queue+0x18b/0x380 [ 1871.074919][T30605] blk_alloc_queue_node+0x55c/0x780 [ 1871.080146][T30605] blk_mq_init_queue+0x4a/0xb0 [ 1871.084923][T30605] loop_add+0x2dd/0x8d0 16:02:49 executing program 0: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1871.089109][T30605] ? idr_find+0x47/0x60 [ 1871.093276][T30605] loop_control_ioctl+0x165/0x360 [ 1871.098306][T30605] ? loop_add+0x8d0/0x8d0 [ 1871.102642][T30605] ? loop_add+0x8d0/0x8d0 [ 1871.106976][T30605] do_vfs_ioctl+0xdb6/0x13e0 [ 1871.111578][T30605] ? ioctl_preallocate+0x210/0x210 [ 1871.116696][T30605] ? __fget+0x388/0x560 [ 1871.120862][T30605] ? ksys_dup3+0x3e0/0x3e0 [ 1871.125286][T30605] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1871.131533][T30605] ? fput_many+0x12c/0x1a0 [ 1871.135962][T30605] ? tomoyo_file_ioctl+0x23/0x30 [ 1871.140900][T30605] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1871.147149][T30605] ? security_file_ioctl+0x8d/0xc0 [ 1871.147166][T30605] ksys_ioctl+0xab/0xd0 [ 1871.147181][T30605] __x64_sys_ioctl+0x73/0xb0 [ 1871.147198][T30605] do_syscall_64+0xfd/0x6a0 [ 1871.147218][T30605] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1871.147231][T30605] RIP: 0033:0x459829 16:02:50 executing program 4: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1871.147246][T30605] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1871.147261][T30605] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1871.203429][T30605] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1871.211413][T30605] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1871.219392][T30605] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1871.227372][T30605] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 16:02:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000a1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1871.235369][T30605] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48000e001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:50 executing program 3 (fault-call:3 fault-nth:27): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:50 executing program 0: socket$netlink(0x10, 0x3, 0x400000000000004) writev(0xffffffffffffffff, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:50 executing program 5 (fault-call:4 fault-nth:29): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:50 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48000f001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:50 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) [ 1871.670932][T30838] FAULT_INJECTION: forcing a failure. [ 1871.670932][T30838] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1871.684484][T30838] CPU: 1 PID: 30838 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1871.692128][T30838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1871.702198][T30838] Call Trace: [ 1871.705510][T30838] dump_stack+0x16f/0x1f0 [ 1871.709869][T30838] should_fail.cold+0xa/0x15 [ 1871.714581][T30838] ? fault_create_debugfs_attr+0x180/0x180 16:02:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) [ 1871.720431][T30838] ? ___might_sleep+0x131/0x280 [ 1871.725335][T30838] should_fail_alloc_page+0x50/0x60 [ 1871.730565][T30838] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1871.735977][T30838] ? find_held_lock+0x35/0x130 [ 1871.740787][T30838] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1871.746531][T30838] ? lock_downgrade+0x920/0x920 [ 1871.751395][T30838] ? rwlock_bug.part.0+0x90/0x90 [ 1871.756357][T30838] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1871.762619][T30838] alloc_pages_current+0x107/0x210 16:02:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) [ 1871.767737][T30838] ? do_raw_spin_unlock+0x57/0x270 [ 1871.772865][T30838] __pmd_alloc+0x41/0x460 [ 1871.777202][T30838] ? __pmd+0x60/0x60 [ 1871.781128][T30838] pmd_alloc+0x10c/0x180 [ 1871.785397][T30838] copy_page_range+0x610/0x1da0 [ 1871.790290][T30838] ? pmd_alloc+0x180/0x180 [ 1871.794726][T30838] ? lock_downgrade+0x920/0x920 [ 1871.799598][T30838] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1871.805346][T30838] ? validate_mm_rb+0xa3/0xc0 [ 1871.810043][T30838] ? __vma_link_rb+0x275/0x370 [ 1871.814830][T30838] ? __kasan_check_write+0x14/0x20 [ 1871.819963][T30838] dup_mm+0xa67/0x1430 [ 1871.824070][T30838] ? vm_area_dup+0x170/0x170 [ 1871.828680][T30838] ? debug_mutex_init+0x2d/0x5a [ 1871.833556][T30838] copy_process+0x26fb/0x6880 [ 1871.838249][T30838] ? get_pid_task+0xcb/0x190 [ 1871.842869][T30838] ? __cleanup_sighand+0x60/0x60 [ 1871.847813][T30838] ? __f_unlock_pos+0x19/0x20 [ 1871.852510][T30838] ? lock_downgrade+0x920/0x920 [ 1871.857369][T30838] ? vfs_write+0x34c/0x5d0 [ 1871.861794][T30838] _do_fork+0x146/0xf60 [ 1871.865946][T30838] ? copy_init_mm+0x20/0x20 [ 1871.870435][T30838] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1871.875966][T30838] ? wait_for_completion+0x440/0x440 [ 1871.881262][T30838] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1871.887514][T30838] __x64_sys_clone+0x18d/0x250 [ 1871.892359][T30838] ? ksys_write+0x1cf/0x290 [ 1871.896866][T30838] ? __ia32_sys_vfork+0xc0/0xc0 [ 1871.901716][T30838] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1871.906992][T30838] ? trace_hardirqs_on+0x67/0x220 [ 1871.912018][T30838] do_syscall_64+0xfd/0x6a0 [ 1871.916533][T30838] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1871.922407][T30838] RIP: 0033:0x459829 [ 1871.926285][T30838] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1871.945891][T30838] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1871.954299][T30838] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1871.962268][T30838] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1871.970256][T30838] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1871.978216][T30838] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1871.986180][T30838] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:50 executing program 3 (fault-call:3 fault-nth:28): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:50 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) [ 1872.025579][T30844] FAULT_INJECTION: forcing a failure. [ 1872.025579][T30844] name failslab, interval 1, probability 0, space 0, times 0 [ 1872.038477][T30844] CPU: 0 PID: 30844 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1872.046975][T30844] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.057040][T30844] Call Trace: [ 1872.060352][T30844] dump_stack+0x16f/0x1f0 [ 1872.064706][T30844] should_fail.cold+0xa/0x15 [ 1872.069321][T30844] ? fault_create_debugfs_attr+0x180/0x180 [ 1872.075153][T30844] __should_failslab+0x121/0x190 [ 1872.075175][T30844] should_failslab+0x9/0x14 [ 1872.075192][T30844] kmem_cache_alloc_node_trace+0x269/0x730 [ 1872.075212][T30844] ? lockdep_init_map+0x1be/0x6d0 [ 1872.075233][T30844] ? init_timer_key+0x13b/0x350 [ 1872.075254][T30844] blk_throtl_init+0x7d/0x680 [ 1872.075276][T30844] blkcg_init_queue+0x237/0x380 [ 1872.075293][T30844] blk_alloc_queue_node+0x55c/0x780 [ 1872.075313][T30844] blk_mq_init_queue+0x4a/0xb0 [ 1872.075335][T30844] loop_add+0x2dd/0x8d0 [ 1872.084774][T30844] ? idr_find+0x47/0x60 [ 1872.084793][T30844] loop_control_ioctl+0x165/0x360 [ 1872.084806][T30844] ? loop_add+0x8d0/0x8d0 [ 1872.084822][T30844] ? loop_add+0x8d0/0x8d0 [ 1872.084838][T30844] do_vfs_ioctl+0xdb6/0x13e0 [ 1872.084855][T30844] ? ioctl_preallocate+0x210/0x210 [ 1872.084873][T30844] ? __fget+0x388/0x560 [ 1872.155762][T30844] ? ksys_dup3+0x3e0/0x3e0 [ 1872.160183][T30844] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1872.166435][T30844] ? fput_many+0x12c/0x1a0 [ 1872.170858][T30844] ? tomoyo_file_ioctl+0x23/0x30 [ 1872.175807][T30844] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1872.182138][T30844] ? security_file_ioctl+0x8d/0xc0 [ 1872.187259][T30844] ksys_ioctl+0xab/0xd0 [ 1872.191421][T30844] __x64_sys_ioctl+0x73/0xb0 [ 1872.196022][T30844] do_syscall_64+0xfd/0x6a0 [ 1872.200540][T30844] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1872.206435][T30844] RIP: 0033:0x459829 [ 1872.210331][T30844] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1872.230030][T30844] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1872.238444][T30844] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1872.246420][T30844] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1872.254402][T30844] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1872.262381][T30844] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1872.270358][T30844] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1872.381778][T30976] FAULT_INJECTION: forcing a failure. [ 1872.381778][T30976] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1872.395379][T30976] CPU: 0 PID: 30976 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1872.403030][T30976] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.413090][T30976] Call Trace: [ 1872.416399][T30976] dump_stack+0x16f/0x1f0 [ 1872.420746][T30976] should_fail.cold+0xa/0x15 [ 1872.425347][T30976] ? fault_create_debugfs_attr+0x180/0x180 16:02:51 executing program 5 (fault-call:4 fault-nth:30): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, 0x0, 0x0) 16:02:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480060001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) 16:02:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000601400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1872.431175][T30976] ? ___might_sleep+0x131/0x280 [ 1872.436042][T30976] should_fail_alloc_page+0x50/0x60 [ 1872.441255][T30976] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1872.446643][T30976] ? __pmd_alloc+0x377/0x460 [ 1872.451247][T30976] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1872.456991][T30976] ? rwlock_bug.part.0+0x90/0x90 [ 1872.461955][T30976] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1872.468212][T30976] alloc_pages_current+0x107/0x210 [ 1872.473338][T30976] pte_alloc_one+0x1b/0x1a0 [ 1872.477850][T30976] __pte_alloc+0x20/0x310 [ 1872.482198][T30976] copy_page_range+0x1447/0x1da0 [ 1872.487177][T30976] ? pmd_alloc+0x180/0x180 [ 1872.491610][T30976] ? lock_downgrade+0x920/0x920 [ 1872.496478][T30976] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1872.502219][T30976] ? validate_mm_rb+0xa3/0xc0 [ 1872.506931][T30976] ? __vma_link_rb+0x275/0x370 [ 1872.511721][T30976] ? __kasan_check_write+0x14/0x20 [ 1872.516848][T30976] dup_mm+0xa67/0x1430 [ 1872.520944][T30976] ? vm_area_dup+0x170/0x170 [ 1872.525559][T30976] ? debug_mutex_init+0x2d/0x5a [ 1872.530440][T30976] copy_process+0x26fb/0x6880 [ 1872.535144][T30976] ? get_pid_task+0xcb/0x190 [ 1872.539765][T30976] ? __cleanup_sighand+0x60/0x60 [ 1872.544712][T30976] ? __f_unlock_pos+0x19/0x20 [ 1872.549409][T30976] ? lock_downgrade+0x920/0x920 [ 1872.554270][T30976] ? vfs_write+0x34c/0x5d0 [ 1872.559145][T30976] _do_fork+0x146/0xf60 [ 1872.563325][T30976] ? copy_init_mm+0x20/0x20 [ 1872.567854][T30976] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1872.573417][T30976] ? wait_for_completion+0x440/0x440 16:02:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) 16:02:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1872.578718][T30976] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1872.584988][T30976] __x64_sys_clone+0x18d/0x250 [ 1872.589763][T30976] ? ksys_write+0x1cf/0x290 [ 1872.594274][T30976] ? __ia32_sys_vfork+0xc0/0xc0 [ 1872.599146][T30976] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1872.604444][T30976] ? trace_hardirqs_on+0x67/0x220 [ 1872.609485][T30976] do_syscall_64+0xfd/0x6a0 [ 1872.614006][T30976] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1872.619895][T30976] RIP: 0033:0x459829 [ 1872.623831][T30976] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1872.643465][T30976] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1872.651880][T30976] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1872.651889][T30976] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1872.651898][T30976] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 16:02:51 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) [ 1872.651906][T30976] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1872.651921][T30976] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1872.707942][T30994] FAULT_INJECTION: forcing a failure. [ 1872.707942][T30994] name failslab, interval 1, probability 0, space 0, times 0 [ 1872.720581][T30994] CPU: 1 PID: 30994 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1872.728217][T30994] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1872.738277][T30994] Call Trace: [ 1872.741589][T30994] dump_stack+0x16f/0x1f0 [ 1872.746721][T30994] should_fail.cold+0xa/0x15 [ 1872.751343][T30994] ? fault_create_debugfs_attr+0x180/0x180 [ 1872.757200][T30994] __should_failslab+0x121/0x190 [ 1872.757223][T30994] should_failslab+0x9/0x14 [ 1872.766643][T30994] kmem_cache_alloc_node_trace+0x5a/0x730 [ 1872.772383][T30994] ? do_raw_spin_lock+0x12a/0x2e0 [ 1872.777444][T30994] ? rwlock_bug.part.0+0x90/0x90 [ 1872.782402][T30994] ? lock_acquire+0x190/0x400 [ 1872.787102][T30994] ? blkcg_activate_policy+0x16e/0x5a0 [ 1872.792572][T30994] throtl_pd_alloc+0x8b/0x990 [ 1872.797262][T30994] ? throtl_add_bio_tg+0x210/0x210 [ 1872.802384][T30994] blkcg_activate_policy+0x26a/0x5a0 [ 1872.807689][T30994] blk_throtl_init+0x459/0x680 [ 1872.812469][T30994] blkcg_init_queue+0x237/0x380 [ 1872.817323][T30994] blk_alloc_queue_node+0x55c/0x780 [ 1872.822529][T30994] blk_mq_init_queue+0x4a/0xb0 [ 1872.827302][T30994] loop_add+0x2dd/0x8d0 [ 1872.831468][T30994] ? idr_find+0x47/0x60 [ 1872.835638][T30994] loop_control_ioctl+0x165/0x360 [ 1872.840670][T30994] ? loop_add+0x8d0/0x8d0 [ 1872.845005][T30994] ? loop_add+0x8d0/0x8d0 [ 1872.849342][T30994] do_vfs_ioctl+0xdb6/0x13e0 [ 1872.853939][T30994] ? ioctl_preallocate+0x210/0x210 [ 1872.859054][T30994] ? __fget+0x388/0x560 [ 1872.863224][T30994] ? ksys_dup3+0x3e0/0x3e0 [ 1872.867650][T30994] ? tomoyo_file_ioctl+0x23/0x30 [ 1872.872598][T30994] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 16:02:51 executing program 3 (fault-call:3 fault-nth:29): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800f0001400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:51 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000022300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:51 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) [ 1872.879982][T30994] ? security_file_ioctl+0x8d/0xc0 [ 1872.885102][T30994] ksys_ioctl+0xab/0xd0 [ 1872.889269][T30994] __x64_sys_ioctl+0x73/0xb0 [ 1872.893869][T30994] do_syscall_64+0xfd/0x6a0 [ 1872.898839][T30994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1872.904733][T30994] RIP: 0033:0x459829 [ 1872.908635][T30994] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1872.928252][T30994] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1872.936686][T30994] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1872.944659][T30994] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1872.952636][T30994] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1872.960624][T30994] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1872.968617][T30994] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:51 executing program 5 (fault-call:4 fault-nth:31): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1873.110552][T31210] FAULT_INJECTION: forcing a failure. [ 1873.110552][T31210] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.123361][T31210] CPU: 1 PID: 31210 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1873.131012][T31210] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.141079][T31210] Call Trace: [ 1873.144381][T31210] dump_stack+0x16f/0x1f0 [ 1873.148732][T31210] should_fail.cold+0xa/0x15 [ 1873.153343][T31210] ? fault_create_debugfs_attr+0x180/0x180 16:02:51 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000a1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1873.153376][T31210] __should_failslab+0x121/0x190 [ 1873.153404][T31210] should_failslab+0x9/0x14 [ 1873.168698][T31210] kmem_cache_alloc+0x298/0x700 [ 1873.173562][T31210] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1873.179824][T31210] ptlock_alloc+0x20/0x70 [ 1873.184173][T31210] pte_alloc_one+0x6d/0x1a0 [ 1873.188687][T31210] __pte_alloc+0x20/0x310 [ 1873.193028][T31210] copy_page_range+0x1447/0x1da0 [ 1873.197995][T31210] ? pmd_alloc+0x180/0x180 [ 1873.202431][T31210] ? lock_downgrade+0x920/0x920 [ 1873.207298][T31210] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1873.213038][T31210] ? validate_mm_rb+0xa3/0xc0 [ 1873.217734][T31210] ? __vma_link_rb+0x275/0x370 [ 1873.222505][T31210] ? __kasan_check_write+0x14/0x20 [ 1873.227630][T31210] dup_mm+0xa67/0x1430 [ 1873.231719][T31210] ? vm_area_dup+0x170/0x170 [ 1873.231739][T31210] ? debug_mutex_init+0x2d/0x5a [ 1873.231760][T31210] copy_process+0x26fb/0x6880 [ 1873.231773][T31210] ? get_pid_task+0xcb/0x190 [ 1873.231798][T31210] ? __cleanup_sighand+0x60/0x60 [ 1873.231820][T31210] ? __f_unlock_pos+0x19/0x20 [ 1873.241365][T31210] ? lock_downgrade+0x920/0x920 [ 1873.250590][T31210] ? vfs_write+0x34c/0x5d0 [ 1873.260171][T31210] _do_fork+0x146/0xf60 [ 1873.269423][T31210] ? copy_init_mm+0x20/0x20 [ 1873.278245][T31210] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1873.283808][T31210] ? wait_for_completion+0x440/0x440 [ 1873.289125][T31210] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1873.295381][T31210] __x64_sys_clone+0x18d/0x250 [ 1873.300165][T31210] ? ksys_write+0x1cf/0x290 [ 1873.304677][T31210] ? __ia32_sys_vfork+0xc0/0xc0 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1873.309544][T31210] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1873.314854][T31210] ? trace_hardirqs_on+0x67/0x220 [ 1873.319889][T31210] do_syscall_64+0xfd/0x6a0 [ 1873.324448][T31210] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1873.330353][T31210] RIP: 0033:0x459829 [ 1873.334341][T31210] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280), 0x0) 16:02:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:52 executing program 3 (fault-call:3 fault-nth:30): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1873.353978][T31210] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1873.362398][T31210] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1873.370387][T31210] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1873.378379][T31210] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1873.386368][T31210] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1873.394347][T31210] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) [ 1873.471397][T31223] FAULT_INJECTION: forcing a failure. [ 1873.471397][T31223] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.484032][T31223] CPU: 0 PID: 31223 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1873.491666][T31223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.501724][T31223] Call Trace: [ 1873.505031][T31223] dump_stack+0x16f/0x1f0 [ 1873.509379][T31223] should_fail.cold+0xa/0x15 [ 1873.513984][T31223] ? fault_create_debugfs_attr+0x180/0x180 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) [ 1873.519814][T31223] __should_failslab+0x121/0x190 [ 1873.524770][T31223] should_failslab+0x9/0x14 [ 1873.529907][T31223] kmem_cache_alloc_node_trace+0x5a/0x730 [ 1873.535678][T31223] ? do_raw_spin_lock+0x12a/0x2e0 [ 1873.540741][T31223] ? rwlock_bug.part.0+0x90/0x90 [ 1873.545809][T31223] ? lock_acquire+0x190/0x400 [ 1873.550530][T31223] ? blkcg_activate_policy+0x16e/0x5a0 [ 1873.556071][T31223] throtl_pd_alloc+0x8b/0x990 [ 1873.560780][T31223] ? throtl_add_bio_tg+0x210/0x210 [ 1873.565906][T31223] blkcg_activate_policy+0x26a/0x5a0 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) [ 1873.571219][T31223] blk_throtl_init+0x459/0x680 [ 1873.575995][T31223] blkcg_init_queue+0x237/0x380 [ 1873.580877][T31223] blk_alloc_queue_node+0x55c/0x780 [ 1873.586095][T31223] blk_mq_init_queue+0x4a/0xb0 [ 1873.590871][T31223] loop_add+0x2dd/0x8d0 [ 1873.595047][T31223] ? idr_find+0x47/0x60 [ 1873.599211][T31223] loop_control_ioctl+0x165/0x360 [ 1873.604242][T31223] ? loop_add+0x8d0/0x8d0 [ 1873.608585][T31223] ? loop_add+0x8d0/0x8d0 [ 1873.612929][T31223] do_vfs_ioctl+0xdb6/0x13e0 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) [ 1873.617529][T31223] ? ioctl_preallocate+0x210/0x210 [ 1873.622650][T31223] ? __fget+0x388/0x560 [ 1873.626827][T31223] ? ksys_dup3+0x3e0/0x3e0 [ 1873.631270][T31223] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1873.637516][T31223] ? fput_many+0x12c/0x1a0 [ 1873.641943][T31223] ? tomoyo_file_ioctl+0x23/0x30 [ 1873.646881][T31223] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1873.653179][T31223] ? security_file_ioctl+0x8d/0xc0 [ 1873.658292][T31223] ksys_ioctl+0xab/0xd0 [ 1873.662456][T31223] __x64_sys_ioctl+0x73/0xb0 [ 1873.667052][T31223] do_syscall_64+0xfd/0x6a0 [ 1873.671564][T31223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1873.677459][T31223] RIP: 0033:0x459829 [ 1873.681357][T31223] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1873.700967][T31223] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1873.709391][T31223] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1873.717383][T31223] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1873.725362][T31223] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1873.733344][T31223] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1873.741310][T31223] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1873.895505][T31342] FAULT_INJECTION: forcing a failure. [ 1873.895505][T31342] name failslab, interval 1, probability 0, space 0, times 0 [ 1873.908409][T31342] CPU: 1 PID: 31342 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1873.916066][T31342] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1873.926160][T31342] Call Trace: [ 1873.929472][T31342] dump_stack+0x16f/0x1f0 [ 1873.933833][T31342] should_fail.cold+0xa/0x15 [ 1873.938465][T31342] ? fault_create_debugfs_attr+0x180/0x180 [ 1873.944308][T31342] __should_failslab+0x121/0x190 [ 1873.949274][T31342] should_failslab+0x9/0x14 [ 1873.953804][T31342] kmem_cache_alloc+0x298/0x700 [ 1873.958685][T31342] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1873.964431][T31342] ? __vm_enough_memory+0x17e/0x3a0 [ 1873.969761][T31342] vm_area_dup+0x21/0x170 [ 1873.974146][T31342] dup_mm+0x549/0x1430 [ 1873.978281][T31342] ? vm_area_dup+0x170/0x170 [ 1873.982902][T31342] ? debug_mutex_init+0x2d/0x5a [ 1873.987806][T31342] copy_process+0x26fb/0x6880 [ 1873.992499][T31342] ? get_pid_task+0xcb/0x190 [ 1873.992530][T31342] ? __cleanup_sighand+0x60/0x60 [ 1873.992550][T31342] ? __f_unlock_pos+0x19/0x20 [ 1873.992584][T31342] ? lock_downgrade+0x920/0x920 [ 1874.011621][T31342] ? vfs_write+0x34c/0x5d0 [ 1874.016072][T31342] _do_fork+0x146/0xf60 [ 1874.020248][T31342] ? copy_init_mm+0x20/0x20 [ 1874.024775][T31342] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1874.030349][T31342] ? wait_for_completion+0x440/0x440 [ 1874.035663][T31342] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1874.041924][T31342] __x64_sys_clone+0x18d/0x250 [ 1874.046704][T31342] ? ksys_write+0x1cf/0x290 [ 1874.051219][T31342] ? __ia32_sys_vfork+0xc0/0xc0 [ 1874.056094][T31342] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1874.061389][T31342] ? trace_hardirqs_on+0x67/0x220 [ 1874.066446][T31342] do_syscall_64+0xfd/0x6a0 [ 1874.070973][T31342] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1874.076876][T31342] RIP: 0033:0x459829 [ 1874.080779][T31342] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1874.100400][T31342] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1874.108827][T31342] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1874.116814][T31342] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1874.124791][T31342] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1874.132786][T31342] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:52 executing program 5 (fault-call:4 fault-nth:32): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:52 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000ec000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:52 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800c00e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000000f00190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1874.140763][T31342] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:53 executing program 3 (fault-call:3 fault-nth:31): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) 16:02:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) [ 1874.273031][T31457] FAULT_INJECTION: forcing a failure. [ 1874.273031][T31457] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.285963][T31457] CPU: 1 PID: 31457 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1874.293611][T31457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1874.303670][T31457] Call Trace: [ 1874.306977][T31457] dump_stack+0x16f/0x1f0 [ 1874.311355][T31457] should_fail.cold+0xa/0x15 [ 1874.315972][T31457] ? fault_create_debugfs_attr+0x180/0x180 16:02:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001200190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{0x0}], 0x1) [ 1874.321825][T31457] ? blk_mq_rq_inflight+0x120/0x120 [ 1874.327191][T31457] __should_failslab+0x121/0x190 [ 1874.332551][T31457] should_failslab+0x9/0x14 [ 1874.337099][T31457] __kmalloc+0x2ce/0x760 [ 1874.341389][T31457] ? kmem_cache_alloc_trace+0x37c/0x770 [ 1874.347047][T31457] ? throtl_pd_free+0x23/0x30 [ 1874.351743][T31457] ? blkcg_activate_policy+0x8e/0x5a0 [ 1874.357121][T31457] ? blk_stat_alloc_callback+0x84/0x270 [ 1874.362685][T31457] ? blk_mq_rq_inflight+0x120/0x120 [ 1874.367913][T31457] blk_stat_alloc_callback+0x84/0x270 16:02:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) [ 1874.373298][T31457] ? tg_last_low_overflow_time+0x630/0x630 [ 1874.379123][T31457] ? blk_mq_can_queue+0x50/0x50 [ 1874.383999][T31457] blk_mq_init_allocated_queue+0x81/0x15b0 [ 1874.389826][T31457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1874.396084][T31457] ? blkcg_init_queue+0x1b2/0x380 [ 1874.401121][T31457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1874.407380][T31457] blk_mq_init_queue+0x62/0xb0 [ 1874.407400][T31457] loop_add+0x2dd/0x8d0 [ 1874.407425][T31457] ? idr_find+0x47/0x60 [ 1874.407447][T31457] loop_control_ioctl+0x165/0x360 [ 1874.416345][T31457] ? loop_add+0x8d0/0x8d0 [ 1874.429827][T31457] ? loop_add+0x8d0/0x8d0 [ 1874.434172][T31457] do_vfs_ioctl+0xdb6/0x13e0 [ 1874.438863][T31457] ? ioctl_preallocate+0x210/0x210 [ 1874.443983][T31457] ? __fget+0x388/0x560 [ 1874.448150][T31457] ? ksys_dup3+0x3e0/0x3e0 [ 1874.452580][T31457] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1874.458860][T31457] ? fput_many+0x12c/0x1a0 [ 1874.463300][T31457] ? tomoyo_file_ioctl+0x23/0x30 [ 1874.468248][T31457] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1874.474507][T31457] ? security_file_ioctl+0x8d/0xc0 [ 1874.479724][T31457] ksys_ioctl+0xab/0xd0 [ 1874.483894][T31457] __x64_sys_ioctl+0x73/0xb0 [ 1874.488496][T31457] do_syscall_64+0xfd/0x6a0 [ 1874.493017][T31457] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1874.498920][T31457] RIP: 0033:0x459829 [ 1874.502912][T31457] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1874.522534][T31457] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1874.530959][T31457] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1874.538946][T31457] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1874.546933][T31457] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1874.554908][T31457] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1874.562879][T31457] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1874.597476][T31570] FAULT_INJECTION: forcing a failure. [ 1874.597476][T31570] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.610244][T31570] CPU: 1 PID: 31570 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1874.617888][T31570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1874.627951][T31570] Call Trace: [ 1874.631265][T31570] dump_stack+0x16f/0x1f0 [ 1874.635617][T31570] should_fail.cold+0xa/0x15 [ 1874.640236][T31570] ? fault_create_debugfs_attr+0x180/0x180 [ 1874.646076][T31570] __should_failslab+0x121/0x190 [ 1874.651031][T31570] should_failslab+0x9/0x14 [ 1874.655548][T31570] kmem_cache_alloc+0x298/0x700 [ 1874.660420][T31570] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 1874.666680][T31570] ptlock_alloc+0x20/0x70 [ 1874.671026][T31570] pte_alloc_one+0x6d/0x1a0 [ 1874.675555][T31570] __pte_alloc+0x20/0x310 [ 1874.679903][T31570] copy_page_range+0x1447/0x1da0 [ 1874.684879][T31570] ? pmd_alloc+0x180/0x180 [ 1874.689313][T31570] ? lock_downgrade+0x920/0x920 16:02:53 executing program 5 (fault-call:4 fault-nth:33): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:53 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1874.694180][T31570] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1874.699918][T31570] ? validate_mm_rb+0xa3/0xc0 [ 1874.704618][T31570] ? __vma_link_rb+0x275/0x370 [ 1874.709401][T31570] ? __kasan_check_write+0x14/0x20 [ 1874.714535][T31570] dup_mm+0xa67/0x1430 [ 1874.718636][T31570] ? vm_area_dup+0x170/0x170 [ 1874.723257][T31570] ? debug_mutex_init+0x2d/0x5a [ 1874.728169][T31570] copy_process+0x26fb/0x6880 [ 1874.732868][T31570] ? get_pid_task+0xcb/0x190 [ 1874.737496][T31570] ? __cleanup_sighand+0x60/0x60 [ 1874.742478][T31570] ? __f_unlock_pos+0x19/0x20 16:02:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) [ 1874.742509][T31570] ? lock_downgrade+0x920/0x920 [ 1874.742533][T31570] ? vfs_write+0x34c/0x5d0 [ 1874.752038][T31570] _do_fork+0x146/0xf60 [ 1874.752055][T31570] ? copy_init_mm+0x20/0x20 [ 1874.752069][T31570] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1874.752087][T31570] ? wait_for_completion+0x440/0x440 [ 1874.752109][T31570] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1874.787616][T31570] __x64_sys_clone+0x18d/0x250 [ 1874.792394][T31570] ? ksys_write+0x1cf/0x290 [ 1874.796938][T31570] ? __ia32_sys_vfork+0xc0/0xc0 [ 1874.801806][T31570] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1874.807108][T31570] ? trace_hardirqs_on+0x67/0x220 [ 1874.812254][T31570] do_syscall_64+0xfd/0x6a0 [ 1874.816784][T31570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1874.822684][T31570] RIP: 0033:0x459829 [ 1874.826585][T31570] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:53 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) [ 1874.826595][T31570] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1874.826610][T31570] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1874.826619][T31570] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1874.826629][T31570] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1874.826638][T31570] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1874.826647][T31570] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1874.922115][T31586] FAULT_INJECTION: forcing a failure. [ 1874.922115][T31586] name failslab, interval 1, probability 0, space 0, times 0 [ 1874.934839][T31586] CPU: 1 PID: 31586 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1874.942479][T31586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1874.952628][T31586] Call Trace: [ 1874.955935][T31586] dump_stack+0x16f/0x1f0 [ 1874.960285][T31586] should_fail.cold+0xa/0x15 [ 1874.964898][T31586] ? fault_create_debugfs_attr+0x180/0x180 [ 1874.970737][T31586] ? blk_mq_rq_inflight+0x120/0x120 [ 1874.975954][T31586] __should_failslab+0x121/0x190 [ 1874.980916][T31586] should_failslab+0x9/0x14 [ 1874.985438][T31586] __kmalloc+0x2ce/0x760 [ 1874.989686][T31586] ? kmem_cache_alloc_trace+0x37c/0x770 [ 1874.995240][T31586] ? throtl_pd_free+0x23/0x30 [ 1874.999920][T31586] ? blkcg_activate_policy+0x8e/0x5a0 [ 1875.005294][T31586] ? blk_stat_alloc_callback+0x84/0x270 [ 1875.010860][T31586] ? blk_mq_rq_inflight+0x120/0x120 [ 1875.016070][T31586] blk_stat_alloc_callback+0x84/0x270 [ 1875.021448][T31586] ? tg_last_low_overflow_time+0x630/0x630 [ 1875.027263][T31586] ? blk_mq_can_queue+0x50/0x50 [ 1875.032122][T31586] blk_mq_init_allocated_queue+0x81/0x15b0 [ 1875.037952][T31586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1875.044378][T31586] ? blkcg_init_queue+0x1b2/0x380 [ 1875.049419][T31586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1875.055675][T31586] blk_mq_init_queue+0x62/0xb0 [ 1875.060451][T31586] loop_add+0x2dd/0x8d0 [ 1875.064611][T31586] ? idr_find+0x47/0x60 [ 1875.068775][T31586] loop_control_ioctl+0x165/0x360 [ 1875.073800][T31586] ? loop_add+0x8d0/0x8d0 [ 1875.078139][T31586] ? loop_add+0x8d0/0x8d0 [ 1875.082471][T31586] do_vfs_ioctl+0xdb6/0x13e0 [ 1875.087065][T31586] ? ioctl_preallocate+0x210/0x210 [ 1875.092183][T31586] ? __fget+0x388/0x560 [ 1875.096340][T31586] ? ksys_dup3+0x3e0/0x3e0 [ 1875.100755][T31586] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1875.107002][T31586] ? fput_many+0x12c/0x1a0 [ 1875.111694][T31586] ? tomoyo_file_ioctl+0x23/0x30 [ 1875.116639][T31586] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1875.122879][T31586] ? security_file_ioctl+0x8d/0xc0 [ 1875.127989][T31586] ksys_ioctl+0xab/0xd0 [ 1875.132149][T31586] __x64_sys_ioctl+0x73/0xb0 [ 1875.136742][T31586] do_syscall_64+0xfd/0x6a0 [ 1875.141251][T31586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1875.147137][T31586] RIP: 0033:0x459829 [ 1875.151028][T31586] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:54 executing program 3 (fault-call:3 fault-nth:32): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1875.170639][T31586] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1875.179054][T31586] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1875.187029][T31586] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1875.195040][T31586] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1875.203113][T31586] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1875.211098][T31586] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1875.342420][T31708] FAULT_INJECTION: forcing a failure. [ 1875.342420][T31708] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.355258][T31708] CPU: 0 PID: 31708 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1875.362902][T31708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1875.372977][T31708] Call Trace: [ 1875.376289][T31708] dump_stack+0x16f/0x1f0 [ 1875.380649][T31708] should_fail.cold+0xa/0x15 [ 1875.385270][T31708] ? fault_create_debugfs_attr+0x180/0x180 [ 1875.391109][T31708] ? find_held_lock+0x35/0x130 [ 1875.395892][T31708] ? memcg_kmem_put_cache+0xaf/0x1b0 [ 1875.401217][T31708] __should_failslab+0x121/0x190 [ 1875.406282][T31708] should_failslab+0x9/0x14 [ 1875.410816][T31708] kmem_cache_alloc+0x47/0x700 [ 1875.415613][T31708] anon_vma_clone+0xde/0x480 [ 1875.420233][T31708] anon_vma_fork+0x8f/0x4a0 [ 1875.424753][T31708] ? dup_userfaultfd+0x15e/0x6d0 [ 1875.429713][T31708] ? memcpy+0x46/0x50 [ 1875.433715][T31708] dup_mm+0xa47/0x1430 [ 1875.437815][T31708] ? vm_area_dup+0x170/0x170 16:02:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800003f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)}], 0x1) 16:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1875.442435][T31708] ? debug_mutex_init+0x2d/0x5a [ 1875.447397][T31708] copy_process+0x26fb/0x6880 [ 1875.452092][T31708] ? get_pid_task+0xcb/0x190 [ 1875.456706][T31708] ? __cleanup_sighand+0x60/0x60 [ 1875.461657][T31708] ? __f_unlock_pos+0x19/0x20 [ 1875.466353][T31708] ? lock_downgrade+0x920/0x920 [ 1875.471243][T31708] ? vfs_write+0x34c/0x5d0 [ 1875.475730][T31708] _do_fork+0x146/0xf60 [ 1875.479904][T31708] ? copy_init_mm+0x20/0x20 [ 1875.484441][T31708] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1875.490015][T31708] ? wait_for_completion+0x440/0x440 [ 1875.495331][T31708] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1875.501596][T31708] __x64_sys_clone+0x18d/0x250 [ 1875.501616][T31708] ? ksys_write+0x1cf/0x290 [ 1875.501639][T31708] ? __ia32_sys_vfork+0xc0/0xc0 [ 1875.510897][T31708] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1875.521009][T31708] ? trace_hardirqs_on+0x67/0x220 [ 1875.526054][T31708] do_syscall_64+0xfd/0x6a0 [ 1875.530578][T31708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1875.536477][T31708] RIP: 0033:0x459829 16:02:54 executing program 5 (fault-call:4 fault-nth:34): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1875.540380][T31708] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1875.559990][T31708] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1875.568409][T31708] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1875.576406][T31708] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1875.584381][T31708] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1875.584390][T31708] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1875.584398][T31708] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000002302190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) [ 1875.693875][T31722] FAULT_INJECTION: forcing a failure. [ 1875.693875][T31722] name failslab, interval 1, probability 0, space 0, times 0 [ 1875.706798][T31722] CPU: 1 PID: 31722 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1875.714444][T31722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1875.724509][T31722] Call Trace: [ 1875.727823][T31722] dump_stack+0x16f/0x1f0 [ 1875.732176][T31722] should_fail.cold+0xa/0x15 [ 1875.736784][T31722] ? fault_create_debugfs_attr+0x180/0x180 [ 1875.742617][T31722] ? blk_mq_rq_inflight+0x120/0x120 [ 1875.747834][T31722] __should_failslab+0x121/0x190 [ 1875.752792][T31722] should_failslab+0x9/0x14 [ 1875.757316][T31722] __kmalloc+0x2ce/0x760 [ 1875.761576][T31722] ? kmem_cache_alloc_trace+0x37c/0x770 [ 1875.769098][T31722] ? throtl_pd_free+0x23/0x30 [ 1875.777010][T31722] ? blkcg_activate_policy+0x8e/0x5a0 [ 1875.782401][T31722] ? blk_stat_alloc_callback+0x84/0x270 [ 1875.788362][T31722] ? blk_mq_rq_inflight+0x120/0x120 [ 1875.793576][T31722] blk_stat_alloc_callback+0x84/0x270 [ 1875.798970][T31722] ? tg_last_low_overflow_time+0x630/0x630 [ 1875.804786][T31722] ? blk_mq_can_queue+0x50/0x50 [ 1875.804806][T31722] blk_mq_init_allocated_queue+0x81/0x15b0 [ 1875.804826][T31722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1875.804841][T31722] ? blkcg_init_queue+0x1b2/0x380 [ 1875.804864][T31722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1875.833171][T31722] blk_mq_init_queue+0x62/0xb0 [ 1875.837954][T31722] loop_add+0x2dd/0x8d0 [ 1875.842122][T31722] ? idr_find+0x47/0x60 [ 1875.842140][T31722] loop_control_ioctl+0x165/0x360 [ 1875.842158][T31722] ? loop_add+0x8d0/0x8d0 [ 1875.851325][T31722] ? loop_add+0x8d0/0x8d0 [ 1875.859943][T31722] do_vfs_ioctl+0xdb6/0x13e0 [ 1875.864547][T31722] ? ioctl_preallocate+0x210/0x210 [ 1875.869665][T31722] ? __fget+0x388/0x560 [ 1875.873839][T31722] ? ksys_dup3+0x3e0/0x3e0 [ 1875.878267][T31722] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1875.884520][T31722] ? fput_many+0x12c/0x1a0 [ 1875.889115][T31722] ? tomoyo_file_ioctl+0x23/0x30 16:02:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000000c00e190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:54 executing program 3 (fault-call:3 fault-nth:33): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1875.894059][T31722] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1875.900306][T31722] ? security_file_ioctl+0x8d/0xc0 [ 1875.905430][T31722] ksys_ioctl+0xab/0xd0 [ 1875.909592][T31722] __x64_sys_ioctl+0x73/0xb0 [ 1875.914192][T31722] do_syscall_64+0xfd/0x6a0 [ 1875.918711][T31722] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1875.924610][T31722] RIP: 0033:0x459829 16:02:54 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) [ 1875.928770][T31722] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1875.948382][T31722] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1875.956810][T31722] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1875.964794][T31722] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1875.972775][T31722] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1875.980754][T31722] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 16:02:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000401400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1875.988734][T31722] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:54 executing program 5 (fault-call:4 fault-nth:35): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:54 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:54 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001402190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1876.154557][T31955] FAULT_INJECTION: forcing a failure. [ 1876.154557][T31955] name failslab, interval 1, probability 0, space 0, times 0 [ 1876.167475][T31955] CPU: 0 PID: 31955 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1876.175123][T31955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1876.185189][T31955] Call Trace: [ 1876.188494][T31955] dump_stack+0x16f/0x1f0 [ 1876.192842][T31955] should_fail.cold+0xa/0x15 [ 1876.197456][T31955] ? fault_create_debugfs_attr+0x180/0x180 [ 1876.203297][T31955] __should_failslab+0x121/0x190 [ 1876.208267][T31955] should_failslab+0x9/0x14 [ 1876.212802][T31955] kmem_cache_alloc+0x47/0x700 [ 1876.217594][T31955] ? anon_vma_chain_link+0x154/0x1c0 [ 1876.222911][T31955] anon_vma_clone+0xde/0x480 [ 1876.227559][T31955] anon_vma_fork+0x8f/0x4a0 [ 1876.232094][T31955] ? dup_userfaultfd+0x15e/0x6d0 [ 1876.237061][T31955] ? memcpy+0x46/0x50 [ 1876.241079][T31955] dup_mm+0xa47/0x1430 [ 1876.245194][T31955] ? vm_area_dup+0x170/0x170 [ 1876.249908][T31955] ? debug_mutex_init+0x2d/0x5a [ 1876.254817][T31955] copy_process+0x26fb/0x6880 [ 1876.259523][T31955] ? get_pid_task+0xcb/0x190 [ 1876.264160][T31955] ? __cleanup_sighand+0x60/0x60 [ 1876.269115][T31955] ? __f_unlock_pos+0x19/0x20 [ 1876.273820][T31955] ? lock_downgrade+0x920/0x920 [ 1876.278701][T31955] ? vfs_write+0x34c/0x5d0 [ 1876.283154][T31955] _do_fork+0x146/0xf60 [ 1876.287332][T31955] ? copy_init_mm+0x20/0x20 [ 1876.291849][T31955] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1876.297427][T31955] ? wait_for_completion+0x440/0x440 [ 1876.302741][T31955] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1876.309005][T31955] __x64_sys_clone+0x18d/0x250 [ 1876.313788][T31955] ? ksys_write+0x1cf/0x290 [ 1876.318318][T31955] ? __ia32_sys_vfork+0xc0/0xc0 [ 1876.323188][T31955] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1876.328486][T31955] ? trace_hardirqs_on+0x67/0x220 [ 1876.333534][T31955] do_syscall_64+0xfd/0x6a0 [ 1876.338058][T31955] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1876.343956][T31955] RIP: 0033:0x459829 [ 1876.347854][T31955] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1876.350804][T32064] FAULT_INJECTION: forcing a failure. [ 1876.350804][T32064] name failslab, interval 1, probability 0, space 0, times 0 [ 1876.367458][T31955] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1876.367473][T31955] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1876.367480][T31955] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1876.367488][T31955] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1876.367496][T31955] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1876.367503][T31955] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1876.428822][T32064] CPU: 1 PID: 32064 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1876.436451][T32064] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1876.446505][T32064] Call Trace: [ 1876.449806][T32064] dump_stack+0x16f/0x1f0 [ 1876.454143][T32064] should_fail.cold+0xa/0x15 [ 1876.458747][T32064] ? fault_create_debugfs_attr+0x180/0x180 [ 1876.464572][T32064] __should_failslab+0x121/0x190 [ 1876.469516][T32064] should_failslab+0x9/0x14 [ 1876.474023][T32064] kmem_cache_alloc_node_trace+0x269/0x730 [ 1876.479841][T32064] ? find_next_bit+0x107/0x130 [ 1876.484633][T32064] __kmalloc_node+0x3d/0x70 [ 1876.489149][T32064] blk_mq_init_allocated_queue+0x3c7/0x15b0 [ 1876.495048][T32064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 16:02:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000601400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:55 executing program 3 (fault-call:3 fault-nth:34): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001404190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca", 0x24}], 0x1) 16:02:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) [ 1876.501298][T32064] ? blkcg_init_queue+0x1b2/0x380 [ 1876.506330][T32064] ? __sanitizer_cov_trace_const_cmp4+0x7/0x20 [ 1876.512491][T32064] blk_mq_init_queue+0x62/0xb0 [ 1876.517266][T32064] loop_add+0x2dd/0x8d0 [ 1876.521429][T32064] ? idr_find+0x47/0x60 [ 1876.525597][T32064] loop_control_ioctl+0x165/0x360 [ 1876.530632][T32064] ? loop_add+0x8d0/0x8d0 [ 1876.534966][T32064] ? loop_add+0x8d0/0x8d0 [ 1876.539302][T32064] do_vfs_ioctl+0xdb6/0x13e0 [ 1876.543899][T32064] ? ioctl_preallocate+0x210/0x210 [ 1876.549016][T32064] ? __fget+0x388/0x560 16:02:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) [ 1876.553178][T32064] ? ksys_dup3+0x3e0/0x3e0 [ 1876.557601][T32064] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1876.563847][T32064] ? fput_many+0x12c/0x1a0 [ 1876.568274][T32064] ? tomoyo_file_ioctl+0x23/0x30 [ 1876.573214][T32064] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1876.579459][T32064] ? security_file_ioctl+0x8d/0xc0 [ 1876.584580][T32064] ksys_ioctl+0xab/0xd0 [ 1876.588744][T32064] __x64_sys_ioctl+0x73/0xb0 [ 1876.593339][T32064] do_syscall_64+0xfd/0x6a0 [ 1876.597856][T32064] entry_SYSCALL_64_after_hwframe+0x49/0xbe 16:02:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) [ 1876.603778][T32064] RIP: 0033:0x459829 [ 1876.607674][T32064] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1876.627880][T32064] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1876.636298][T32064] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1876.644275][T32064] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 16:02:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) [ 1876.652244][T32064] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1876.660214][T32064] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1876.668187][T32064] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1876.786330][T32084] FAULT_INJECTION: forcing a failure. [ 1876.786330][T32084] name failslab, interval 1, probability 0, space 0, times 0 [ 1876.799177][T32084] CPU: 0 PID: 32084 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1876.806815][T32084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1876.816888][T32084] Call Trace: [ 1876.820205][T32084] dump_stack+0x16f/0x1f0 [ 1876.824584][T32084] should_fail.cold+0xa/0x15 [ 1876.829203][T32084] ? fault_create_debugfs_attr+0x180/0x180 [ 1876.835035][T32084] __should_failslab+0x121/0x190 [ 1876.839987][T32084] should_failslab+0x9/0x14 [ 1876.844502][T32084] kmem_cache_alloc+0x298/0x700 [ 1876.849374][T32084] ? anon_vma_clone+0x320/0x480 [ 1876.854241][T32084] anon_vma_fork+0xfc/0x4a0 [ 1876.854266][T32084] ? dup_userfaultfd+0x15e/0x6d0 [ 1876.854283][T32084] ? memcpy+0x46/0x50 [ 1876.854305][T32084] dup_mm+0xa47/0x1430 [ 1876.854336][T32084] ? vm_area_dup+0x170/0x170 [ 1876.854363][T32084] ? debug_mutex_init+0x2d/0x5a [ 1876.863782][T32084] copy_process+0x26fb/0x6880 [ 1876.863796][T32084] ? get_pid_task+0xcb/0x190 [ 1876.863821][T32084] ? __cleanup_sighand+0x60/0x60 [ 1876.863834][T32084] ? __f_unlock_pos+0x19/0x20 [ 1876.863856][T32084] ? lock_downgrade+0x920/0x920 [ 1876.863875][T32084] ? vfs_write+0x34c/0x5d0 [ 1876.910926][T32084] _do_fork+0x146/0xf60 [ 1876.915094][T32084] ? copy_init_mm+0x20/0x20 [ 1876.919601][T32084] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1876.925154][T32084] ? wait_for_completion+0x440/0x440 [ 1876.930451][T32084] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1876.936702][T32084] __x64_sys_clone+0x18d/0x250 [ 1876.941471][T32084] ? ksys_write+0x1cf/0x290 [ 1876.945977][T32084] ? __ia32_sys_vfork+0xc0/0xc0 [ 1876.950856][T32084] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1876.950876][T32084] ? trace_hardirqs_on+0x67/0x220 [ 1876.950896][T32084] do_syscall_64+0xfd/0x6a0 [ 1876.950926][T32084] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1876.961209][T32084] RIP: 0033:0x459829 [ 1876.975483][T32084] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1876.995119][T32084] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1877.003620][T32084] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1877.011595][T32084] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1877.019570][T32084] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1877.027649][T32084] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:55 executing program 5 (fault-call:4 fault-nth:36): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) 16:02:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000000140a190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1877.035635][T32084] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1877.065846][T32186] FAULT_INJECTION: forcing a failure. [ 1877.065846][T32186] name failslab, interval 1, probability 0, space 0, times 0 [ 1877.078891][T32186] CPU: 1 PID: 32186 Comm: syz-executor.5 Not tainted 5.2.0+ #71 16:02:55 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800ea6e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1877.086532][T32186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1877.096619][T32186] Call Trace: [ 1877.099936][T32186] dump_stack+0x16f/0x1f0 [ 1877.104797][T32186] should_fail.cold+0xa/0x15 [ 1877.109413][T32186] ? fault_create_debugfs_attr+0x180/0x180 [ 1877.115250][T32186] ? __kasan_check_read+0x11/0x20 [ 1877.120317][T32186] __should_failslab+0x121/0x190 [ 1877.125284][T32186] should_failslab+0x9/0x14 [ 1877.129800][T32186] kmem_cache_alloc_node_trace+0x269/0x730 [ 1877.135616][T32186] ? __kmalloc_node+0x3d/0x70 [ 1877.140312][T32186] __kmalloc_node+0x3d/0x70 [ 1877.144842][T32186] sbitmap_init_node+0x29e/0x510 [ 1877.149817][T32186] blk_mq_realloc_hw_ctxs+0xaeb/0x1300 [ 1877.155289][T32186] ? kasan_unpoison_shadow+0x35/0x50 [ 1877.160595][T32186] blk_mq_init_allocated_queue+0x473/0x15b0 [ 1877.166507][T32186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1877.172760][T32186] ? blkcg_init_queue+0x1b2/0x380 [ 1877.177800][T32186] ? __sanitizer_cov_trace_const_cmp4+0x7/0x20 16:02:55 executing program 3 (fault-call:3 fault-nth:35): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:55 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) 16:02:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000000140e190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:55 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) [ 1877.183969][T32186] blk_mq_init_queue+0x62/0xb0 [ 1877.188750][T32186] loop_add+0x2dd/0x8d0 [ 1877.192941][T32186] ? idr_find+0x47/0x60 [ 1877.197117][T32186] loop_control_ioctl+0x165/0x360 [ 1877.202151][T32186] ? loop_add+0x8d0/0x8d0 [ 1877.206489][T32186] ? loop_add+0x8d0/0x8d0 [ 1877.210825][T32186] do_vfs_ioctl+0xdb6/0x13e0 [ 1877.215426][T32186] ? ioctl_preallocate+0x210/0x210 [ 1877.220539][T32186] ? __fget+0x388/0x560 [ 1877.224703][T32186] ? ksys_dup3+0x3e0/0x3e0 [ 1877.229123][T32186] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1877.235365][T32186] ? fput_many+0x12c/0x1a0 [ 1877.239794][T32186] ? tomoyo_file_ioctl+0x23/0x30 [ 1877.244736][T32186] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1877.250981][T32186] ? security_file_ioctl+0x8d/0xc0 [ 1877.256097][T32186] ksys_ioctl+0xab/0xd0 [ 1877.260270][T32186] __x64_sys_ioctl+0x73/0xb0 [ 1877.264864][T32186] do_syscall_64+0xfd/0x6a0 [ 1877.269394][T32186] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1877.275294][T32186] RIP: 0033:0x459829 [ 1877.279192][T32186] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1877.298799][T32186] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1877.307222][T32186] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1877.315199][T32186] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1877.323197][T32186] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1877.331180][T32186] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 16:02:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) [ 1877.339160][T32186] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:56 executing program 5 (fault-call:4 fault-nth:37): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="48000000140f190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff000000", 0x36}], 0x1) [ 1877.561367][T32251] FAULT_INJECTION: forcing a failure. [ 1877.561367][T32251] name failslab, interval 1, probability 0, space 0, times 0 [ 1877.574168][T32251] CPU: 1 PID: 32251 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1877.581805][T32251] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1877.591868][T32251] Call Trace: [ 1877.595175][T32251] dump_stack+0x16f/0x1f0 [ 1877.599524][T32251] should_fail.cold+0xa/0x15 [ 1877.604131][T32251] ? fault_create_debugfs_attr+0x180/0x180 [ 1877.609974][T32251] __should_failslab+0x121/0x190 [ 1877.614938][T32251] should_failslab+0x9/0x14 [ 1877.619445][T32251] kmem_cache_alloc+0x298/0x700 [ 1877.624301][T32251] ? anon_vma_clone+0x320/0x480 [ 1877.624327][T32251] anon_vma_fork+0x1ea/0x4a0 [ 1877.624353][T32251] ? dup_userfaultfd+0x15e/0x6d0 [ 1877.638704][T32251] dup_mm+0xa47/0x1430 [ 1877.642793][T32251] ? vm_area_dup+0x170/0x170 [ 1877.647393][T32251] ? debug_mutex_init+0x2d/0x5a [ 1877.652262][T32251] copy_process+0x26fb/0x6880 [ 1877.656947][T32251] ? get_pid_task+0xcb/0x190 [ 1877.661551][T32251] ? __cleanup_sighand+0x60/0x60 [ 1877.661567][T32251] ? __f_unlock_pos+0x19/0x20 [ 1877.661590][T32251] ? lock_downgrade+0x920/0x920 [ 1877.661609][T32251] ? vfs_write+0x34c/0x5d0 [ 1877.671206][T32251] _do_fork+0x146/0xf60 [ 1877.684586][T32251] ? copy_init_mm+0x20/0x20 [ 1877.689098][T32251] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1877.694654][T32251] ? wait_for_completion+0x440/0x440 [ 1877.699961][T32251] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1877.706217][T32251] __x64_sys_clone+0x18d/0x250 [ 1877.708407][T32303] FAULT_INJECTION: forcing a failure. [ 1877.708407][T32303] name failslab, interval 1, probability 0, space 0, times 0 [ 1877.710997][T32251] ? ksys_write+0x1cf/0x290 [ 1877.728072][T32251] ? __ia32_sys_vfork+0xc0/0xc0 [ 1877.732940][T32251] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1877.738241][T32251] ? trace_hardirqs_on+0x67/0x220 [ 1877.743275][T32251] do_syscall_64+0xfd/0x6a0 [ 1877.747803][T32251] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1877.753695][T32251] RIP: 0033:0x459829 [ 1877.757593][T32251] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1877.777206][T32251] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1877.785629][T32251] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1877.793616][T32251] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1877.801596][T32251] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 16:02:56 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) [ 1877.809574][T32251] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1877.817553][T32251] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1877.825588][T32303] CPU: 0 PID: 32303 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1877.833264][T32303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1877.843328][T32303] Call Trace: [ 1877.846627][T32303] dump_stack+0x16f/0x1f0 [ 1877.850985][T32303] should_fail.cold+0xa/0x15 [ 1877.855600][T32303] ? fault_create_debugfs_attr+0x180/0x180 [ 1877.861472][T32303] __should_failslab+0x121/0x190 [ 1877.866552][T32303] should_failslab+0x9/0x14 [ 1877.871079][T32303] kmem_cache_alloc_node_trace+0x269/0x730 [ 1877.876894][T32303] ? lockdep_init_map+0x1be/0x6d0 [ 1877.881949][T32303] ? __raw_spin_lock_init+0x2d/0x100 [ 1877.887267][T32303] blk_alloc_flush_queue+0x8f/0x2d0 [ 1877.892606][T32303] blk_mq_realloc_hw_ctxs+0xc67/0x1300 [ 1877.898073][T32303] ? kasan_unpoison_shadow+0x35/0x50 [ 1877.903377][T32303] blk_mq_init_allocated_queue+0x473/0x15b0 16:02:56 executing program 0: socket$inet_udplite(0x2, 0x2, 0x88) r0 = syz_open_procfs(0x0, &(0x7f00000001c0)='\x00\x00\x00\x00\x00\xe8\xee\xc9\x96\xc2;\xaf\t5,\xffx\xf0\xde\xc4\xa8M*\xe4;~y\xb6&\xa5\xaa\xcec\x1e\x8a;\xea;P\xb5w_6\f\xe5\xcc`\xa0\xce\xf0+\x19v\xb9I\xdf\xfe\x13\xd9\x1a\xd6;+\x16\x05\x1aul>\x82@\x0f\xdf\xcd\x99\x9a\x13\xe2[F\xf08\xa6D\x97\xb5\x1f\xf3\xe9\xd5\xbf\x13k\xbc)\xa1nbx\x9c\x02\xa6p?\x12\x89\nAr\xe9Q\xb0\x80Q\x8e\xf2\xf0yX\x9b\x96\xa4\x8b\x01f\xe0\x04\xbd\x93K!\xa0D-\xfc\x12\x02\xe2\xb5WQ\xb4\xb1\xf2\x16)\xc8\b\xc2\x99\x9a\xd9\xa6p\xedK\xb5\x8b\xe8\xbf\xa0\xa1\x13\xd78Mt$\x06\xb6c\xd0Y\x05\xd1l\x98|\xff\xb5\v\x93 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1878.041656][T32303] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1878.050170][T32303] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 16:02:56 executing program 3 (fault-call:3 fault-nth:36): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:56 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001460190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1878.058147][T32303] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000003 [ 1878.066127][T32303] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1878.074113][T32303] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1878.082125][T32303] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000004 16:02:56 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) [ 1878.313074][T32458] FAULT_INJECTION: forcing a failure. [ 1878.313074][T32458] name failslab, interval 1, probability 0, space 0, times 0 [ 1878.325995][T32458] CPU: 1 PID: 32458 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1878.333742][T32458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1878.343814][T32458] Call Trace: [ 1878.347115][T32458] dump_stack+0x16f/0x1f0 [ 1878.351466][T32458] should_fail.cold+0xa/0x15 [ 1878.356075][T32458] ? fault_create_debugfs_attr+0x180/0x180 [ 1878.361916][T32458] __should_failslab+0x121/0x190 [ 1878.366960][T32458] should_failslab+0x9/0x14 [ 1878.371471][T32458] kmem_cache_alloc+0x298/0x700 [ 1878.376338][T32458] ? validate_mm_rb+0xa3/0xc0 [ 1878.381045][T32458] vm_area_dup+0x21/0x170 [ 1878.385400][T32458] dup_mm+0x549/0x1430 [ 1878.389511][T32458] ? vm_area_dup+0x170/0x170 [ 1878.394161][T32458] ? debug_mutex_init+0x2d/0x5a [ 1878.399039][T32458] copy_process+0x26fb/0x6880 [ 1878.403737][T32458] ? get_pid_task+0xcb/0x190 [ 1878.403772][T32458] ? __cleanup_sighand+0x60/0x60 [ 1878.403795][T32458] ? __f_unlock_pos+0x19/0x20 [ 1878.413407][T32458] ? lock_downgrade+0x920/0x920 [ 1878.413427][T32458] ? vfs_write+0x34c/0x5d0 [ 1878.413452][T32458] _do_fork+0x146/0xf60 [ 1878.431505][T32458] ? copy_init_mm+0x20/0x20 [ 1878.436026][T32458] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1878.441586][T32458] ? wait_for_completion+0x440/0x440 [ 1878.446900][T32458] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1878.453159][T32458] __x64_sys_clone+0x18d/0x250 [ 1878.457935][T32458] ? ksys_write+0x1cf/0x290 [ 1878.462464][T32458] ? __ia32_sys_vfork+0xc0/0xc0 [ 1878.467355][T32458] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1878.472647][T32458] ? trace_hardirqs_on+0x67/0x220 [ 1878.472667][T32458] do_syscall_64+0xfd/0x6a0 [ 1878.472689][T32458] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1878.472706][T32458] RIP: 0033:0x459829 [ 1878.492045][T32458] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 16:02:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400400d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) 16:02:57 executing program 5 (fault-call:4 fault-nth:38): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:57 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) writev(r1, &(0x7f00000001c0)=[{&(0x7f00000000c0)='G', 0x1}], 0x1) [ 1878.511660][T32458] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1878.520083][T32458] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1878.528071][T32458] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1878.536080][T32458] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1878.544060][T32458] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1878.552043][T32458] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1878.597448][T32559] FAULT_INJECTION: forcing a failure. [ 1878.597448][T32559] name failslab, interval 1, probability 0, space 0, times 0 [ 1878.610356][T32559] CPU: 1 PID: 32559 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1878.618037][T32559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1878.628132][T32559] Call Trace: [ 1878.631455][T32559] dump_stack+0x16f/0x1f0 [ 1878.635814][T32559] should_fail.cold+0xa/0x15 [ 1878.640458][T32559] ? fault_create_debugfs_attr+0x180/0x180 [ 1878.646305][T32559] __should_failslab+0x121/0x190 [ 1878.651270][T32559] should_failslab+0x9/0x14 [ 1878.655806][T32559] kmem_cache_alloc_node_trace+0x269/0x730 [ 1878.661633][T32559] ? elevator_get.constprop.0+0x84/0x100 [ 1878.667285][T32559] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1878.673654][T32559] ? find_next_bit+0x107/0x130 [ 1878.678473][T32559] blk_mq_init_tags+0x73/0x2c0 [ 1878.683287][T32559] blk_mq_alloc_rq_map+0x88/0x200 [ 1878.688326][T32559] blk_mq_init_sched+0x20c/0x766 [ 1878.693288][T32559] elevator_init_mq+0xcd/0x160 16:02:57 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000080)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x80284504, &(0x7f0000000100)=""/232) 16:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5", 0x3f}], 0x1) [ 1878.698083][T32559] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1878.704271][T32559] blk_mq_init_queue+0x62/0xb0 [ 1878.709057][T32559] loop_add+0x2dd/0x8d0 [ 1878.713238][T32559] ? idr_find+0x47/0x60 [ 1878.717427][T32559] loop_control_ioctl+0x165/0x360 [ 1878.722475][T32559] ? loop_add+0x8d0/0x8d0 [ 1878.726854][T32559] ? loop_add+0x8d0/0x8d0 [ 1878.731203][T32559] do_vfs_ioctl+0xdb6/0x13e0 [ 1878.735816][T32559] ? ioctl_preallocate+0x210/0x210 [ 1878.740941][T32559] ? __fget+0x388/0x560 16:02:57 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="48006eea1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:57 executing program 3 (fault-call:3 fault-nth:37): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1878.745576][T32559] ? ksys_dup3+0x3e0/0x3e0 [ 1878.750011][T32559] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1878.756264][T32559] ? fput_many+0x12c/0x1a0 [ 1878.760696][T32559] ? tomoyo_file_ioctl+0x23/0x30 [ 1878.765653][T32559] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1878.771909][T32559] ? security_file_ioctl+0x8d/0xc0 [ 1878.777042][T32559] ksys_ioctl+0xab/0xd0 [ 1878.781216][T32559] __x64_sys_ioctl+0x73/0xb0 [ 1878.785830][T32559] do_syscall_64+0xfd/0x6a0 16:02:57 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09024beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1878.794121][T32559] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1878.800026][T32559] RIP: 0033:0x459829 [ 1878.803936][T32559] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1878.823548][T32559] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1878.831983][T32559] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1878.839968][T32559] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 16:02:57 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='\x00\x00\x00\x00\x00\x00\x00\x00') fchdir(r0) r1 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r1, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) clone(0x800081ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, 0x0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) [ 1878.847955][T32559] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1878.855937][T32559] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1878.863917][T32559] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) [ 1878.996880][ T306] FAULT_INJECTION: forcing a failure. [ 1878.996880][ T306] name failslab, interval 1, probability 0, space 0, times 0 [ 1879.009792][ T306] CPU: 1 PID: 306 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1879.017282][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1879.027356][ T306] Call Trace: [ 1879.030666][ T306] dump_stack+0x16f/0x1f0 [ 1879.035011][ T306] should_fail.cold+0xa/0x15 [ 1879.039621][ T306] ? fault_create_debugfs_attr+0x180/0x180 [ 1879.045466][ T306] __should_failslab+0x121/0x190 [ 1879.050436][ T306] should_failslab+0x9/0x14 [ 1879.054959][ T306] kmem_cache_alloc+0x298/0x700 [ 1879.059833][ T306] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1879.065584][ T306] ? __vm_enough_memory+0x17e/0x3a0 [ 1879.070831][ T306] vm_area_dup+0x21/0x170 [ 1879.075187][ T306] dup_mm+0x549/0x1430 [ 1879.079291][ T306] ? vm_area_dup+0x170/0x170 [ 1879.083909][ T306] ? debug_mutex_init+0x2d/0x5a [ 1879.088784][ T306] copy_process+0x26fb/0x6880 16:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) 16:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e000090", 0x44}], 0x1) [ 1879.093472][ T306] ? get_pid_task+0xcb/0x190 [ 1879.098177][ T306] ? __cleanup_sighand+0x60/0x60 [ 1879.103134][ T306] ? __f_unlock_pos+0x19/0x20 [ 1879.107838][ T306] ? lock_downgrade+0x920/0x920 [ 1879.112716][ T306] ? vfs_write+0x34c/0x5d0 [ 1879.117153][ T306] _do_fork+0x146/0xf60 [ 1879.121326][ T306] ? copy_init_mm+0x20/0x20 [ 1879.125844][ T306] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1879.131414][ T306] ? wait_for_completion+0x440/0x440 [ 1879.136726][ T306] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1879.142983][ T306] __x64_sys_clone+0x18d/0x250 16:02:57 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) [ 1879.147763][ T306] ? ksys_write+0x1cf/0x290 [ 1879.152285][ T306] ? __ia32_sys_vfork+0xc0/0xc0 [ 1879.157164][ T306] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1879.162463][ T306] ? trace_hardirqs_on+0x67/0x220 [ 1879.167513][ T306] do_syscall_64+0xfd/0x6a0 [ 1879.172045][ T306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1879.177944][ T306] RIP: 0033:0x459829 [ 1879.181845][ T306] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1879.201456][ T306] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1879.209876][ T306] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1879.217853][ T306] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1879.225838][ T306] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1879.233822][ T306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 16:02:58 executing program 5 (fault-call:4 fault-nth:39): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09044beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1879.242226][ T306] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 16:02:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f00000000c0)={0x28}, 0x28) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "b40900", 0x30, 0x0, 0x0, @ipv4={[], [], @multicast2}, @mcast2, {[], @icmpv6=@time_exceed={0xffffff88, 0x0, 0x0, 0x0, [0x9, 0x4], {0x0, 0x6, "b680fa", 0x0, 0x0, 0x0, @ipv4={[], [], @broadcast}, @ipv4={[], [], @remote={0xac, 0x14, 0xffffffffffffffff}}}}}}}}}, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd9c) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 1879.397751][ T463] FAULT_INJECTION: forcing a failure. [ 1879.397751][ T463] name failslab, interval 1, probability 0, space 0, times 0 [ 1879.410606][ T463] CPU: 0 PID: 463 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1879.418068][ T463] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1879.428121][ T463] Call Trace: [ 1879.431431][ T463] dump_stack+0x16f/0x1f0 [ 1879.435782][ T463] should_fail.cold+0xa/0x15 [ 1879.440399][ T463] ? fault_create_debugfs_attr+0x180/0x180 [ 1879.446239][ T463] __should_failslab+0x121/0x190 [ 1879.451199][ T463] should_failslab+0x9/0x14 [ 1879.455750][ T463] kmem_cache_alloc_node_trace+0x269/0x730 [ 1879.461574][ T463] ? mark_lock+0xc0/0x11e0 [ 1879.466012][ T463] __kmalloc_node+0x3d/0x70 [ 1879.470572][ T463] sbitmap_init_node+0x29e/0x510 [ 1879.475542][ T463] sbitmap_queue_init_node+0x40/0x710 [ 1879.480934][ T463] ? find_next_bit+0x107/0x130 [ 1879.485720][ T463] blk_mq_init_tags+0x119/0x2c0 [ 1879.490593][ T463] blk_mq_alloc_rq_map+0x88/0x200 [ 1879.495635][ T463] blk_mq_init_sched+0x20c/0x766 [ 1879.500598][ T463] elevator_init_mq+0xcd/0x160 [ 1879.505380][ T463] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1879.511384][ T463] blk_mq_init_queue+0x62/0xb0 [ 1879.516160][ T463] loop_add+0x2dd/0x8d0 [ 1879.520332][ T463] ? idr_find+0x47/0x60 [ 1879.524510][ T463] loop_control_ioctl+0x165/0x360 [ 1879.529540][ T463] ? loop_add+0x8d0/0x8d0 [ 1879.533892][ T463] ? loop_add+0x8d0/0x8d0 [ 1879.538241][ T463] do_vfs_ioctl+0xdb6/0x13e0 [ 1879.542843][ T463] ? ioctl_preallocate+0x210/0x210 16:02:58 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000f01400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e0000905294", 0x46}], 0x1) 16:02:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d090a4beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:58 executing program 3 (fault-call:3 fault-nth:38): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1879.547964][ T463] ? __fget+0x388/0x560 [ 1879.552138][ T463] ? ksys_dup3+0x3e0/0x3e0 [ 1879.556557][ T463] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1879.562800][ T463] ? fput_many+0x12c/0x1a0 [ 1879.567231][ T463] ? tomoyo_file_ioctl+0x23/0x30 [ 1879.572173][ T463] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1879.578420][ T463] ? security_file_ioctl+0x8d/0xc0 [ 1879.583538][ T463] ksys_ioctl+0xab/0xd0 [ 1879.587702][ T463] __x64_sys_ioctl+0x73/0xb0 [ 1879.592298][ T463] do_syscall_64+0xfd/0x6a0 16:02:58 executing program 0: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x2, 0x8004e20}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) r3 = getpgrp(0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000200)=r3) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x17, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, 0x0) syz_genetlink_get_family_id$nbd(0x0) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) ioctl$PPPIOCGFLAGS1(0xffffffffffffffff, 0x8004745a, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 1879.596812][ T463] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1879.602707][ T463] RIP: 0033:0x459829 [ 1879.606602][ T463] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1879.626214][ T463] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1879.634638][ T463] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1879.642701][ T463] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1879.650676][ T463] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1879.658644][ T463] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1879.666616][ T463] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1879.807367][ T720] FAULT_INJECTION: forcing a failure. [ 1879.807367][ T720] name failslab, interval 1, probability 0, space 0, times 0 [ 1879.820148][ T720] CPU: 0 PID: 720 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1879.827628][ T720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1879.838007][ T720] Call Trace: [ 1879.841331][ T720] dump_stack+0x16f/0x1f0 [ 1879.845693][ T720] should_fail.cold+0xa/0x15 [ 1879.850311][ T720] ? fault_create_debugfs_attr+0x180/0x180 [ 1879.856137][ T720] ? find_held_lock+0x35/0x130 [ 1879.860913][ T720] ? memcg_kmem_put_cache+0xaf/0x1b0 [ 1879.866216][ T720] __should_failslab+0x121/0x190 [ 1879.871271][ T720] should_failslab+0x9/0x14 [ 1879.875794][ T720] kmem_cache_alloc+0x47/0x700 [ 1879.880587][ T720] anon_vma_clone+0xde/0x480 [ 1879.885189][ T720] anon_vma_fork+0x8f/0x4a0 [ 1879.889718][ T720] ? dup_userfaultfd+0x15e/0x6d0 [ 1879.894652][ T720] ? memcpy+0x46/0x50 [ 1879.898667][ T720] dup_mm+0xa47/0x1430 [ 1879.902843][ T720] ? vm_area_dup+0x170/0x170 [ 1879.907440][ T720] ? debug_mutex_init+0x2d/0x5a [ 1879.912306][ T720] copy_process+0x26fb/0x6880 [ 1879.916989][ T720] ? get_pid_task+0xcb/0x190 [ 1879.921596][ T720] ? __cleanup_sighand+0x60/0x60 [ 1879.926543][ T720] ? __f_unlock_pos+0x19/0x20 [ 1879.931238][ T720] ? lock_downgrade+0x920/0x920 [ 1879.936093][ T720] ? vfs_write+0x34c/0x5d0 [ 1879.940515][ T720] _do_fork+0x146/0xf60 [ 1879.944675][ T720] ? copy_init_mm+0x20/0x20 [ 1879.949185][ T720] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1879.954735][ T720] ? wait_for_completion+0x440/0x440 [ 1879.960030][ T720] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1879.966285][ T720] __x64_sys_clone+0x18d/0x250 [ 1879.971051][ T720] ? ksys_write+0x1cf/0x290 [ 1879.975557][ T720] ? __ia32_sys_vfork+0xc0/0xc0 [ 1879.980418][ T720] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1879.985717][ T720] ? trace_hardirqs_on+0x67/0x220 [ 1879.990745][ T720] do_syscall_64+0xfd/0x6a0 [ 1879.995258][ T720] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1880.001145][ T720] RIP: 0033:0x459829 [ 1880.005060][ T720] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1880.024677][ T720] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1880.033092][ T720] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1880.041164][ T720] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1880.049148][ T720] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 16:02:58 executing program 5 (fault-call:4 fault-nth:40): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:58 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d090e4beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:58 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) [ 1880.057115][ T720] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1880.065084][ T720] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1880.198315][ T769] FAULT_INJECTION: forcing a failure. [ 1880.198315][ T769] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.211125][ T769] CPU: 1 PID: 769 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1880.218592][ T769] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1880.228666][ T769] Call Trace: [ 1880.231983][ T769] dump_stack+0x16f/0x1f0 [ 1880.236342][ T769] should_fail.cold+0xa/0x15 [ 1880.241031][ T769] ? fault_create_debugfs_attr+0x180/0x180 [ 1880.246863][ T769] __should_failslab+0x121/0x190 [ 1880.251810][ T769] should_failslab+0x9/0x14 [ 1880.256325][ T769] kmem_cache_alloc_node_trace+0x269/0x730 [ 1880.262145][ T769] ? mark_lock+0xc0/0x11e0 [ 1880.266578][ T769] __kmalloc_node+0x3d/0x70 [ 1880.271091][ T769] sbitmap_init_node+0x29e/0x510 [ 1880.276057][ T769] sbitmap_queue_init_node+0x40/0x710 [ 1880.281475][ T769] ? find_next_bit+0x107/0x130 [ 1880.286352][ T769] blk_mq_init_tags+0x119/0x2c0 [ 1880.291217][ T769] blk_mq_alloc_rq_map+0x88/0x200 16:02:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000000f00190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:59 executing program 3 (fault-call:3 fault-nth:39): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:02:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d090f4beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1880.296253][ T769] blk_mq_init_sched+0x20c/0x766 [ 1880.301227][ T769] elevator_init_mq+0xcd/0x160 [ 1880.306001][ T769] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1880.312006][ T769] blk_mq_init_queue+0x62/0xb0 [ 1880.316784][ T769] loop_add+0x2dd/0x8d0 [ 1880.320947][ T769] ? idr_find+0x47/0x60 [ 1880.325116][ T769] loop_control_ioctl+0x165/0x360 [ 1880.330160][ T769] ? loop_add+0x8d0/0x8d0 [ 1880.334502][ T769] ? loop_add+0x8d0/0x8d0 [ 1880.338850][ T769] do_vfs_ioctl+0xdb6/0x13e0 [ 1880.343460][ T769] ? ioctl_preallocate+0x210/0x210 16:02:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) [ 1880.348580][ T769] ? __fget+0x388/0x560 [ 1880.352750][ T769] ? ksys_dup3+0x3e0/0x3e0 [ 1880.357202][ T769] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1880.363456][ T769] ? fput_many+0x12c/0x1a0 [ 1880.367873][ T769] ? tomoyo_file_ioctl+0x23/0x30 [ 1880.372915][ T769] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1880.379179][ T769] ? security_file_ioctl+0x8d/0xc0 [ 1880.384289][ T769] ksys_ioctl+0xab/0xd0 [ 1880.388470][ T769] __x64_sys_ioctl+0x73/0xb0 [ 1880.393044][ T769] do_syscall_64+0xfd/0x6a0 [ 1880.397538][ T769] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1880.403416][ T769] RIP: 0033:0x459829 [ 1880.407313][ T769] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1880.426904][ T769] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1880.435322][ T769] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1880.443279][ T769] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1880.451322][ T769] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1880.459275][ T769] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1880.467227][ T769] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:59 executing program 5 (fault-call:4 fault-nth:41): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:02:59 executing program 0: [ 1880.567189][ T863] FAULT_INJECTION: forcing a failure. [ 1880.567189][ T863] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.580629][ T863] CPU: 0 PID: 863 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1880.580642][ T863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1880.580647][ T863] Call Trace: [ 1880.580676][ T863] dump_stack+0x16f/0x1f0 [ 1880.580704][ T863] should_fail.cold+0xa/0x15 [ 1880.580727][ T863] ? fault_create_debugfs_attr+0x180/0x180 [ 1880.580757][ T863] __should_failslab+0x121/0x190 [ 1880.580775][ T863] should_failslab+0x9/0x14 [ 1880.580802][ T863] kmem_cache_alloc+0x298/0x700 [ 1880.598354][ T863] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1880.598371][ T863] ? __vm_enough_memory+0x17e/0x3a0 [ 1880.598392][ T863] vm_area_dup+0x21/0x170 [ 1880.598412][ T863] dup_mm+0x549/0x1430 [ 1880.649910][ T863] ? vm_area_dup+0x170/0x170 [ 1880.654541][ T863] ? debug_mutex_init+0x2d/0x5a [ 1880.659404][ T863] copy_process+0x26fb/0x6880 [ 1880.664092][ T863] ? get_pid_task+0xcb/0x190 [ 1880.668705][ T863] ? __cleanup_sighand+0x60/0x60 [ 1880.673647][ T863] ? __f_unlock_pos+0x19/0x20 [ 1880.678344][ T863] ? lock_downgrade+0x920/0x920 [ 1880.683213][ T863] ? vfs_write+0x34c/0x5d0 [ 1880.685044][ T905] FAULT_INJECTION: forcing a failure. [ 1880.685044][ T905] name failslab, interval 1, probability 0, space 0, times 0 [ 1880.687639][ T863] _do_fork+0x146/0xf60 [ 1880.704386][ T863] ? copy_init_mm+0x20/0x20 [ 1880.708892][ T863] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1880.714447][ T863] ? wait_for_completion+0x440/0x440 [ 1880.719742][ T863] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1880.725997][ T863] __x64_sys_clone+0x18d/0x250 [ 1880.730760][ T863] ? ksys_write+0x1cf/0x290 [ 1880.735268][ T863] ? __ia32_sys_vfork+0xc0/0xc0 [ 1880.740134][ T863] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1880.746954][ T863] ? trace_hardirqs_on+0x67/0x220 [ 1880.752074][ T863] do_syscall_64+0xfd/0x6a0 [ 1880.756585][ T863] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1880.762472][ T863] RIP: 0033:0x459829 [ 1880.766481][ T863] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1880.788868][ T863] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1880.797373][ T863] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1880.805360][ T863] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1880.813360][ T863] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1880.821362][ T863] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1880.829352][ T863] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1880.837348][ T905] CPU: 1 PID: 905 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1880.844814][ T905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1880.854870][ T905] Call Trace: [ 1880.858484][ T905] dump_stack+0x16f/0x1f0 [ 1880.862823][ T905] should_fail.cold+0xa/0x15 [ 1880.867429][ T905] ? fault_create_debugfs_attr+0x180/0x180 [ 1880.873254][ T905] __should_failslab+0x121/0x190 [ 1880.879667][ T905] should_failslab+0x9/0x14 [ 1880.884177][ T905] kmem_cache_alloc_node_trace+0x269/0x730 [ 1880.889992][ T905] ? elevator_get.constprop.0+0x84/0x100 [ 1880.895637][ T905] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1880.902405][ T905] ? find_next_bit+0x107/0x130 [ 1880.907188][ T905] blk_mq_init_tags+0x73/0x2c0 [ 1880.911966][ T905] blk_mq_alloc_rq_map+0x88/0x200 [ 1880.917006][ T905] blk_mq_init_sched+0x20c/0x766 [ 1880.921996][ T905] elevator_init_mq+0xcd/0x160 [ 1880.926775][ T905] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1880.932771][ T905] blk_mq_init_queue+0x62/0xb0 [ 1880.937544][ T905] loop_add+0x2dd/0x8d0 [ 1880.941708][ T905] ? idr_find+0x47/0x60 [ 1880.945874][ T905] loop_control_ioctl+0x165/0x360 [ 1880.950907][ T905] ? loop_add+0x8d0/0x8d0 [ 1880.955249][ T905] ? loop_add+0x8d0/0x8d0 [ 1880.959588][ T905] do_vfs_ioctl+0xdb6/0x13e0 16:02:59 executing program 0: 16:02:59 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09604beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:59 executing program 3 (fault-call:3 fault-nth:40): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1880.964217][ T905] ? ioctl_preallocate+0x210/0x210 [ 1880.969335][ T905] ? __fget+0x388/0x560 [ 1880.973502][ T905] ? ksys_dup3+0x3e0/0x3e0 [ 1880.977932][ T905] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1880.984182][ T905] ? fput_many+0x12c/0x1a0 [ 1880.988611][ T905] ? tomoyo_file_ioctl+0x23/0x30 [ 1880.993560][ T905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1880.999807][ T905] ? security_file_ioctl+0x8d/0xc0 [ 1881.004927][ T905] ksys_ioctl+0xab/0xd0 [ 1881.009095][ T905] __x64_sys_ioctl+0x73/0xb0 [ 1881.013692][ T905] do_syscall_64+0xfd/0x6a0 16:02:59 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001200190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:02:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f", 0x47}], 0x1) [ 1881.018299][ T905] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1881.024200][ T905] RIP: 0033:0x459829 [ 1881.028101][ T905] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1881.047905][ T905] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1881.056333][ T905] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1881.064290][ T905] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1881.072240][ T905] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1881.080208][ T905] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1881.088163][ T905] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:02:59 executing program 0: 16:03:00 executing program 5 (fault-call:4 fault-nth:42): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1881.282942][ T984] FAULT_INJECTION: forcing a failure. [ 1881.282942][ T984] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.295696][ T984] CPU: 1 PID: 984 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1881.303165][ T984] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1881.313261][ T984] Call Trace: [ 1881.316584][ T984] dump_stack+0x16f/0x1f0 [ 1881.320954][ T984] should_fail.cold+0xa/0x15 [ 1881.325572][ T984] ? fault_create_debugfs_attr+0x180/0x180 [ 1881.331426][ T984] __should_failslab+0x121/0x190 [ 1881.336385][ T984] should_failslab+0x9/0x14 [ 1881.339393][ T987] FAULT_INJECTION: forcing a failure. [ 1881.339393][ T987] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.340917][ T984] kmem_cache_alloc+0x47/0x700 [ 1881.358284][ T984] ? anon_vma_chain_link+0x154/0x1c0 [ 1881.363585][ T984] anon_vma_clone+0xde/0x480 [ 1881.368184][ T984] anon_vma_fork+0x8f/0x4a0 [ 1881.372686][ T984] ? dup_userfaultfd+0x15e/0x6d0 [ 1881.377619][ T984] ? memcpy+0x46/0x50 [ 1881.381605][ T984] dup_mm+0xa47/0x1430 [ 1881.385692][ T984] ? vm_area_dup+0x170/0x170 [ 1881.390284][ T984] ? debug_mutex_init+0x2d/0x5a [ 1881.395187][ T984] copy_process+0x26fb/0x6880 [ 1881.399973][ T984] ? get_pid_task+0xcb/0x190 [ 1881.404617][ T984] ? __cleanup_sighand+0x60/0x60 [ 1881.409564][ T984] ? __f_unlock_pos+0x19/0x20 [ 1881.414255][ T984] ? lock_downgrade+0x920/0x920 [ 1881.419144][ T984] ? vfs_write+0x34c/0x5d0 [ 1881.423577][ T984] _do_fork+0x146/0xf60 [ 1881.427741][ T984] ? copy_init_mm+0x20/0x20 [ 1881.432247][ T984] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1881.437832][ T984] ? wait_for_completion+0x440/0x440 [ 1881.443135][ T984] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1881.449384][ T984] __x64_sys_clone+0x18d/0x250 [ 1881.454155][ T984] ? ksys_write+0x1cf/0x290 [ 1881.458659][ T984] ? __ia32_sys_vfork+0xc0/0xc0 [ 1881.463515][ T984] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1881.468806][ T984] ? trace_hardirqs_on+0x67/0x220 [ 1881.473835][ T984] do_syscall_64+0xfd/0x6a0 [ 1881.478527][ T984] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1881.484421][ T984] RIP: 0033:0x459829 [ 1881.488316][ T984] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1881.507921][ T984] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1881.516338][ T984] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1881.524313][ T984] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1881.532307][ T984] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1881.540284][ T984] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1881.548259][ T984] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1881.556260][ T987] CPU: 0 PID: 987 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1881.563723][ T987] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1881.573776][ T987] Call Trace: [ 1881.573803][ T987] dump_stack+0x16f/0x1f0 [ 1881.573821][ T987] should_fail.cold+0xa/0x15 [ 1881.573838][ T987] ? fault_create_debugfs_attr+0x180/0x180 [ 1881.573862][ T987] __should_failslab+0x121/0x190 [ 1881.596765][ T987] should_failslab+0x9/0x14 [ 1881.601301][ T987] kmem_cache_alloc_node_trace+0x269/0x730 [ 1881.607136][ T987] ? lockdep_init_map+0x1be/0x6d0 [ 1881.612169][ T987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.618419][ T987] ? sbitmap_init_node+0x149/0x510 [ 1881.623631][ T987] sbitmap_queue_init_node+0x29e/0x710 [ 1881.629104][ T987] blk_mq_init_tags+0x17b/0x2c0 [ 1881.634313][ T987] blk_mq_alloc_rq_map+0x88/0x200 [ 1881.639352][ T987] blk_mq_init_sched+0x20c/0x766 [ 1881.644308][ T987] elevator_init_mq+0xcd/0x160 [ 1881.649085][ T987] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1881.655092][ T987] blk_mq_init_queue+0x62/0xb0 [ 1881.659862][ T987] loop_add+0x2dd/0x8d0 [ 1881.664021][ T987] ? idr_find+0x47/0x60 [ 1881.668186][ T987] loop_control_ioctl+0x165/0x360 [ 1881.673211][ T987] ? loop_add+0x8d0/0x8d0 [ 1881.677543][ T987] ? loop_add+0x8d0/0x8d0 [ 1881.681877][ T987] do_vfs_ioctl+0xdb6/0x13e0 [ 1881.686486][ T987] ? ioctl_preallocate+0x210/0x210 [ 1881.691606][ T987] ? __fget+0x388/0x560 [ 1881.695774][ T987] ? ksys_dup3+0x3e0/0x3e0 [ 1881.700229][ T987] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1881.706477][ T987] ? fput_many+0x12c/0x1a0 [ 1881.710907][ T987] ? tomoyo_file_ioctl+0x23/0x30 [ 1881.715861][ T987] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1881.722122][ T987] ? security_file_ioctl+0x8d/0xc0 [ 1881.727243][ T987] ksys_ioctl+0xab/0xd0 16:03:00 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560384ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:00 executing program 0: 16:03:00 executing program 4: 16:03:00 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:00 executing program 3 (fault-call:3 fault-nth:41): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1881.731416][ T987] __x64_sys_ioctl+0x73/0xb0 [ 1881.736192][ T987] do_syscall_64+0xfd/0x6a0 [ 1881.740707][ T987] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1881.746639][ T987] RIP: 0033:0x459829 [ 1881.750538][ T987] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1881.770173][ T987] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:03:00 executing program 0: r0 = socket$inet(0x2, 0x1, 0x84) sendto$inet(r0, &(0x7f00000001c0)=';', 0x1, 0x0, &(0x7f0000000080)={0x2, 0x0, @rand_addr=0xfffffffffffffb85}, 0x10) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(r0, 0x84, 0x6d, &(0x7f0000000200)={0x0, 0x10, "b2f7c26fa3d9d6bb7a6c9f3c87756ac0"}, &(0x7f0000000180)=0x18) 16:03:00 executing program 5 (fault-call:4 fault-nth:43): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) [ 1881.778593][ T987] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1881.786575][ T987] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1881.794559][ T987] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1881.802549][ T987] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1881.810616][ T987] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1881.947415][ T1143] FAULT_INJECTION: forcing a failure. [ 1881.947415][ T1143] name failslab, interval 1, probability 0, space 0, times 0 [ 1881.960339][ T1143] CPU: 1 PID: 1143 Comm: syz-executor.3 Not tainted 5.2.0+ #71 [ 1881.967901][ T1143] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1881.978050][ T1143] Call Trace: [ 1881.981362][ T1143] dump_stack+0x16f/0x1f0 [ 1881.985718][ T1143] should_fail.cold+0xa/0x15 [ 1881.990426][ T1143] ? fault_create_debugfs_attr+0x180/0x180 [ 1881.996354][ T1143] __should_failslab+0x121/0x190 [ 1882.001316][ T1143] should_failslab+0x9/0x14 [ 1882.005843][ T1143] kmem_cache_alloc+0x47/0x700 [ 1882.010630][ T1143] ? anon_vma_chain_link+0x154/0x1c0 [ 1882.016051][ T1143] anon_vma_clone+0xde/0x480 [ 1882.020679][ T1143] anon_vma_fork+0x8f/0x4a0 [ 1882.025202][ T1143] ? dup_userfaultfd+0x15e/0x6d0 [ 1882.030184][ T1143] ? memcpy+0x46/0x50 [ 1882.034190][ T1143] dup_mm+0xa47/0x1430 [ 1882.038293][ T1143] ? vm_area_dup+0x170/0x170 [ 1882.042912][ T1143] ? debug_mutex_init+0x2d/0x5a [ 1882.047792][ T1143] copy_process+0x26fb/0x6880 [ 1882.052491][ T1143] ? get_pid_task+0xcb/0x190 [ 1882.057129][ T1143] ? __cleanup_sighand+0x60/0x60 [ 1882.062093][ T1143] ? __f_unlock_pos+0x19/0x20 [ 1882.066791][ T1143] ? lock_downgrade+0x920/0x920 [ 1882.071651][ T1143] ? vfs_write+0x34c/0x5d0 [ 1882.076082][ T1143] _do_fork+0x146/0xf60 [ 1882.080254][ T1143] ? copy_init_mm+0x20/0x20 [ 1882.084764][ T1143] ? __mutex_unlock_slowpath+0xf8/0x6b0 [ 1882.084788][ T1143] ? wait_for_completion+0x440/0x440 [ 1882.084827][ T1143] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1882.101863][ T1143] __x64_sys_clone+0x18d/0x250 [ 1882.106640][ T1143] ? ksys_write+0x1cf/0x290 [ 1882.111160][ T1143] ? __ia32_sys_vfork+0xc0/0xc0 [ 1882.116029][ T1143] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1882.121325][ T1143] ? trace_hardirqs_on+0x67/0x220 [ 1882.126364][ T1143] do_syscall_64+0xfd/0x6a0 [ 1882.130882][ T1143] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1882.136783][ T1143] RIP: 0033:0x459829 16:03:00 executing program 4: [ 1882.140693][ T1143] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1882.145556][ T1159] FAULT_INJECTION: forcing a failure. [ 1882.145556][ T1159] name failslab, interval 1, probability 0, space 0, times 0 [ 1882.160323][ T1143] RSP: 002b:00007ff393a7bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 1882.160338][ T1143] RAX: ffffffffffffffda RBX: 00007ff393a7bc90 RCX: 0000000000459829 [ 1882.160346][ T1143] RDX: 9999999999999999 RSI: 0000000000000000 RDI: 0000000000000000 [ 1882.160354][ T1143] RBP: 000000000075bf20 R08: ffffffffffffffff R09: 0000000000000000 [ 1882.160362][ T1143] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff393a7c6d4 [ 1882.160370][ T1143] R13: 00000000004bfce6 R14: 00000000004d17f8 R15: 0000000000000006 [ 1882.221560][ T1159] CPU: 0 PID: 1159 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1882.229102][ T1159] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1882.239189][ T1159] Call Trace: [ 1882.242490][ T1159] dump_stack+0x16f/0x1f0 [ 1882.246828][ T1159] should_fail.cold+0xa/0x15 [ 1882.251434][ T1159] ? fault_create_debugfs_attr+0x180/0x180 [ 1882.257256][ T1159] __should_failslab+0x121/0x190 [ 1882.262196][ T1159] should_failslab+0x9/0x14 [ 1882.266708][ T1159] kmem_cache_alloc_node_trace+0x269/0x730 [ 1882.272555][ T1159] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1882.278296][ T1159] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 1882.284023][ T1159] ? find_next_bit+0x107/0x130 [ 1882.288806][ T1159] sbitmap_queue_init_node+0x29e/0x710 [ 1882.294283][ T1159] blk_mq_init_tags+0x119/0x2c0 [ 1882.299145][ T1159] blk_mq_alloc_rq_map+0x88/0x200 [ 1882.304182][ T1159] blk_mq_init_sched+0x20c/0x766 [ 1882.309161][ T1159] elevator_init_mq+0xcd/0x160 [ 1882.313936][ T1159] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1882.319940][ T1159] blk_mq_init_queue+0x62/0xb0 [ 1882.324711][ T1159] loop_add+0x2dd/0x8d0 [ 1882.328872][ T1159] ? idr_find+0x47/0x60 [ 1882.333032][ T1159] loop_control_ioctl+0x165/0x360 [ 1882.338056][ T1159] ? loop_add+0x8d0/0x8d0 [ 1882.342427][ T1159] ? loop_add+0x8d0/0x8d0 16:03:01 executing program 3 (fault-call:3 fault-nth:42): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:03:01 executing program 0: 16:03:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c562c84ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000021400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1882.346760][ T1159] do_vfs_ioctl+0xdb6/0x13e0 [ 1882.351366][ T1159] ? ioctl_preallocate+0x210/0x210 [ 1882.356494][ T1159] ? __fget+0x388/0x560 [ 1882.360670][ T1159] ? ksys_dup3+0x3e0/0x3e0 [ 1882.365106][ T1159] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1882.371362][ T1159] ? fput_many+0x12c/0x1a0 [ 1882.375791][ T1159] ? tomoyo_file_ioctl+0x23/0x30 [ 1882.380739][ T1159] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.386985][ T1159] ? security_file_ioctl+0x8d/0xc0 [ 1882.392105][ T1159] ksys_ioctl+0xab/0xd0 16:03:01 executing program 0: 16:03:01 executing program 4: [ 1882.396266][ T1159] __x64_sys_ioctl+0x73/0xb0 [ 1882.400864][ T1159] do_syscall_64+0xfd/0x6a0 [ 1882.405380][ T1159] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1882.411268][ T1159] RIP: 0033:0x459829 [ 1882.415164][ T1159] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1882.434766][ T1159] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1882.443179][ T1159] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1882.451157][ T1159] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1882.459137][ T1159] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1882.467111][ T1159] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1882.475084][ T1159] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:01 executing program 0: 16:03:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe0060000000000000100bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:01 executing program 5 (fault-call:4 fault-nth:44): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:01 executing program 4: 16:03:01 executing program 0: 16:03:01 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000041400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1882.812651][ T1499] FAULT_INJECTION: forcing a failure. [ 1882.812651][ T1499] name failslab, interval 1, probability 0, space 0, times 0 [ 1882.825427][ T1499] CPU: 0 PID: 1499 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1882.832987][ T1499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1882.843061][ T1499] Call Trace: [ 1882.846379][ T1499] dump_stack+0x16f/0x1f0 [ 1882.850749][ T1499] should_fail.cold+0xa/0x15 [ 1882.855374][ T1499] ? fault_create_debugfs_attr+0x180/0x180 [ 1882.861211][ T1499] __should_failslab+0x121/0x190 [ 1882.866186][ T1499] should_failslab+0x9/0x14 [ 1882.870728][ T1499] kmem_cache_alloc_node_trace+0x269/0x730 [ 1882.877013][ T1499] ? sbitmap_queue_init_node+0x57/0x710 [ 1882.882598][ T1499] __kmalloc_node+0x3d/0x70 [ 1882.887138][ T1499] blk_mq_alloc_rq_map+0xb9/0x200 [ 1882.892184][ T1499] blk_mq_init_sched+0x20c/0x766 [ 1882.897164][ T1499] elevator_init_mq+0xcd/0x160 [ 1882.901958][ T1499] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1882.907974][ T1499] blk_mq_init_queue+0x62/0xb0 16:03:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:03:01 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00602000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:01 executing program 4: 16:03:01 executing program 0: [ 1882.912938][ T1499] loop_add+0x2dd/0x8d0 [ 1882.917108][ T1499] ? idr_find+0x47/0x60 [ 1882.921290][ T1499] loop_control_ioctl+0x165/0x360 [ 1882.926378][ T1499] ? loop_add+0x8d0/0x8d0 [ 1882.930727][ T1499] ? loop_add+0x8d0/0x8d0 [ 1882.935061][ T1499] do_vfs_ioctl+0xdb6/0x13e0 [ 1882.939676][ T1499] ? ioctl_preallocate+0x210/0x210 [ 1882.944897][ T1499] ? __fget+0x388/0x560 [ 1882.949104][ T1499] ? ksys_dup3+0x3e0/0x3e0 [ 1882.953555][ T1499] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1882.959818][ T1499] ? fput_many+0x12c/0x1a0 [ 1882.964249][ T1499] ? tomoyo_file_ioctl+0x23/0x30 [ 1882.969199][ T1499] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1882.975446][ T1499] ? security_file_ioctl+0x8d/0xc0 [ 1882.980564][ T1499] ksys_ioctl+0xab/0xd0 [ 1882.984732][ T1499] __x64_sys_ioctl+0x73/0xb0 [ 1882.989333][ T1499] do_syscall_64+0xfd/0x6a0 [ 1882.993849][ T1499] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1882.999741][ T1499] RIP: 0033:0x459829 16:03:01 executing program 0: [ 1883.003642][ T1499] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1883.023287][ T1499] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1883.031726][ T1499] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1883.039965][ T1499] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1883.047949][ T1499] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1883.055957][ T1499] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 16:03:01 executing program 0: [ 1883.063949][ T1499] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:02 executing program 4: 16:03:02 executing program 5 (fault-call:4 fault-nth:45): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00604000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 0: [ 1883.331752][ T1743] FAULT_INJECTION: forcing a failure. [ 1883.331752][ T1743] name failslab, interval 1, probability 0, space 0, times 0 [ 1883.344600][ T1743] CPU: 0 PID: 1743 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1883.352147][ T1743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1883.362201][ T1743] Call Trace: [ 1883.365515][ T1743] dump_stack+0x16f/0x1f0 [ 1883.369865][ T1743] should_fail.cold+0xa/0x15 [ 1883.374484][ T1743] ? fault_create_debugfs_attr+0x180/0x180 [ 1883.380337][ T1743] __should_failslab+0x121/0x190 [ 1883.385290][ T1743] should_failslab+0x9/0x14 [ 1883.389807][ T1743] kmem_cache_alloc_node_trace+0x269/0x730 [ 1883.395636][ T1743] ? sbitmap_queue_init_node+0x57/0x710 [ 1883.401202][ T1743] __kmalloc_node+0x3d/0x70 [ 1883.405727][ T1743] blk_mq_alloc_rq_map+0xb9/0x200 [ 1883.410822][ T1743] blk_mq_init_sched+0x20c/0x766 [ 1883.415807][ T1743] elevator_init_mq+0xcd/0x160 [ 1883.420586][ T1743] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1883.426598][ T1743] blk_mq_init_queue+0x62/0xb0 [ 1883.431372][ T1743] loop_add+0x2dd/0x8d0 [ 1883.435538][ T1743] ? idr_find+0x47/0x60 [ 1883.439709][ T1743] loop_control_ioctl+0x165/0x360 [ 1883.444739][ T1743] ? loop_add+0x8d0/0x8d0 [ 1883.449086][ T1743] ? loop_add+0x8d0/0x8d0 [ 1883.453439][ T1743] do_vfs_ioctl+0xdb6/0x13e0 [ 1883.458138][ T1743] ? ioctl_preallocate+0x210/0x210 [ 1883.463261][ T1743] ? __fget+0x388/0x560 [ 1883.467432][ T1743] ? ksys_dup3+0x3e0/0x3e0 [ 1883.471857][ T1743] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1883.478107][ T1743] ? fput_many+0x12c/0x1a0 16:03:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000a1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 4: [ 1883.482539][ T1743] ? tomoyo_file_ioctl+0x23/0x30 [ 1883.487493][ T1743] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1883.493742][ T1743] ? security_file_ioctl+0x8d/0xc0 [ 1883.498868][ T1743] ksys_ioctl+0xab/0xd0 [ 1883.503035][ T1743] __x64_sys_ioctl+0x73/0xb0 [ 1883.507634][ T1743] do_syscall_64+0xfd/0x6a0 [ 1883.512156][ T1743] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1883.518053][ T1743] RIP: 0033:0x459829 16:03:02 executing program 3: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x40, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000100)) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x80000) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000040)={0x4, 0x6, 0x179c, 0x0, 0x3}) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5421, &(0x7f0000000000)=0x7ff) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) eventfd2(0x0, 0x800) ioctl$IMADDTIMER(r1, 0x80044940, &(0x7f0000000200)=0x32) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe0060a000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 0: [ 1883.521964][ T1743] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1883.541577][ T1743] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1883.550000][ T1743] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1883.557979][ T1743] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1883.565954][ T1743] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1883.573932][ T1743] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1883.581906][ T1743] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:02 executing program 0: 16:03:02 executing program 4: 16:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe0060e000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000e1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 5 (fault-call:4 fault-nth:46): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:02 executing program 0: 16:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe0060f000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 4: [ 1884.099327][ T2047] FAULT_INJECTION: forcing a failure. [ 1884.099327][ T2047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1884.112811][ T2047] CPU: 1 PID: 2047 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1884.120363][ T2047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1884.130416][ T2047] Call Trace: [ 1884.133730][ T2047] dump_stack+0x16f/0x1f0 [ 1884.138076][ T2047] should_fail.cold+0xa/0x15 [ 1884.142686][ T2047] ? fault_create_debugfs_attr+0x180/0x180 [ 1884.148507][ T2047] ? ___might_sleep+0x131/0x280 [ 1884.153388][ T2047] should_fail_alloc_page+0x50/0x60 [ 1884.158610][ T2047] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1884.164008][ T2047] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1884.169739][ T2047] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1884.175992][ T2047] ? find_next_bit+0x107/0x130 [ 1884.180765][ T2047] ? __cpu_to_node+0x7e/0xa0 [ 1884.185365][ T2047] ? memset+0x32/0x40 [ 1884.189370][ T2047] blk_mq_alloc_rqs+0x223/0x7f0 [ 1884.194247][ T2047] blk_mq_init_sched+0x266/0x766 16:03:02 executing program 3: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) io_setup(0x5, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000200)='/dev/vcs#\x00', 0xae0, 0x410002) ioctl$VIDIOC_ENUM_FMT(r2, 0xc0405602, &(0x7f0000000240)={0x9, 0x2, 0x0, "0a52163f694533dd84bee44b98f6716985660c790c7945fae4a587181a7a89be", 0x7f77777f}) r3 = eventfd(0x828) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x6, 0x0, r0, &(0x7f0000000040)="883bc9511f6a885aa926bb917c6f9597c895a2a839f786cc55e24e4e6836129c29fd209a261a66bdb90b6d8d8b857aef02dfaade6a8bdd1f59674e177c555d967ddb02c7c599a0a94d8af1002c148962eedbb570d0ebf8b9437cdd9f33c198cf229597f926621854192857732ef90abcfd5f31fd6da6d349922d9d2366512db2", 0x80, 0x600000, 0x0, 0x2, r3}]) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:03:02 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00660000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:02 executing program 0: 16:03:02 executing program 4: 16:03:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000f1400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:03 executing program 0: [ 1884.199207][ T2047] elevator_init_mq+0xcd/0x160 [ 1884.203983][ T2047] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1884.209990][ T2047] blk_mq_init_queue+0x62/0xb0 [ 1884.214769][ T2047] loop_add+0x2dd/0x8d0 [ 1884.218938][ T2047] ? idr_find+0x47/0x60 [ 1884.223109][ T2047] loop_control_ioctl+0x165/0x360 [ 1884.228144][ T2047] ? loop_add+0x8d0/0x8d0 [ 1884.232486][ T2047] ? loop_add+0x8d0/0x8d0 [ 1884.236833][ T2047] do_vfs_ioctl+0xdb6/0x13e0 [ 1884.241476][ T2047] ? ioctl_preallocate+0x210/0x210 16:03:03 executing program 0: [ 1884.246605][ T2047] ? __fget+0x388/0x560 [ 1884.250782][ T2047] ? ksys_dup3+0x3e0/0x3e0 [ 1884.255207][ T2047] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1884.261469][ T2047] ? fput_many+0x12c/0x1a0 [ 1884.265903][ T2047] ? tomoyo_file_ioctl+0x23/0x30 [ 1884.270886][ T2047] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1884.277136][ T2047] ? security_file_ioctl+0x8d/0xc0 [ 1884.282254][ T2047] ksys_ioctl+0xab/0xd0 [ 1884.286431][ T2047] __x64_sys_ioctl+0x73/0xb0 [ 1884.291038][ T2047] do_syscall_64+0xfd/0x6a0 16:03:03 executing program 0: [ 1884.295554][ T2047] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1884.301451][ T2047] RIP: 0033:0x459829 [ 1884.305353][ T2047] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1884.324968][ T2047] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1884.333392][ T2047] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1884.341376][ T2047] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1884.349349][ T2047] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1884.357325][ T2047] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1884.365293][ T2047] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:03 executing program 5 (fault-call:4 fault-nth:47): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:03 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x18, 0x0, &(0x7f0000000140)=0x43) 16:03:03 executing program 4: 16:03:03 executing program 0: [ 1884.802082][ T2287] FAULT_INJECTION: forcing a failure. [ 1884.802082][ T2287] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1884.815367][ T2287] CPU: 0 PID: 2287 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1884.822911][ T2287] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1884.832970][ T2287] Call Trace: [ 1884.836271][ T2287] dump_stack+0x16f/0x1f0 [ 1884.840608][ T2287] should_fail.cold+0xa/0x15 [ 1884.845209][ T2287] ? fault_create_debugfs_attr+0x180/0x180 [ 1884.851031][ T2287] ? ___might_sleep+0x131/0x280 [ 1884.855948][ T2287] should_fail_alloc_page+0x50/0x60 [ 1884.861167][ T2287] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1884.866561][ T2287] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1884.872305][ T2287] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1884.879561][ T2287] ? find_next_bit+0x107/0x130 [ 1884.884356][ T2287] ? __cpu_to_node+0x7e/0xa0 [ 1884.888982][ T2287] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 1884.894550][ T2287] blk_mq_alloc_rqs+0x223/0x7f0 [ 1884.899414][ T2287] ? __kmalloc_node+0x4e/0x70 [ 1884.904108][ T2287] blk_mq_init_sched+0x266/0x766 [ 1884.909060][ T2287] elevator_init_mq+0xcd/0x160 [ 1884.913831][ T2287] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1884.919825][ T2287] blk_mq_init_queue+0x62/0xb0 [ 1884.924592][ T2287] loop_add+0x2dd/0x8d0 [ 1884.928753][ T2287] ? idr_find+0x47/0x60 [ 1884.932916][ T2287] loop_control_ioctl+0x165/0x360 [ 1884.937952][ T2287] ? loop_add+0x8d0/0x8d0 [ 1884.942289][ T2287] ? loop_add+0x8d0/0x8d0 [ 1884.946627][ T2287] do_vfs_ioctl+0xdb6/0x13e0 [ 1884.951239][ T2287] ? ioctl_preallocate+0x210/0x210 [ 1884.956390][ T2287] ? __fget+0x388/0x560 [ 1884.960571][ T2287] ? ksys_dup3+0x3e0/0x3e0 [ 1884.964987][ T2287] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1884.971227][ T2287] ? fput_many+0x12c/0x1a0 [ 1884.975648][ T2287] ? tomoyo_file_ioctl+0x23/0x30 [ 1884.980584][ T2287] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1884.986826][ T2287] ? security_file_ioctl+0x8d/0xc0 [ 1884.991976][ T2287] ksys_ioctl+0xab/0xd0 [ 1884.996150][ T2287] __x64_sys_ioctl+0x73/0xb0 [ 1885.000746][ T2287] do_syscall_64+0xfd/0x6a0 [ 1885.005259][ T2287] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1885.011153][ T2287] RIP: 0033:0x459829 [ 1885.015048][ T2287] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1885.034659][ T2287] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1885.043078][ T2287] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1885.051064][ T2287] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1885.059060][ T2287] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1885.067089][ T2287] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1885.075067][ T2287] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:03:03 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006f0000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:03 executing program 4: 16:03:03 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000601400190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:03 executing program 0: 16:03:03 executing program 5 (fault-call:4 fault-nth:48): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:04 executing program 4: 16:03:04 executing program 0: 16:03:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006000a0000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1885.354873][ T2373] FAULT_INJECTION: forcing a failure. [ 1885.354873][ T2373] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1885.368196][ T2373] CPU: 0 PID: 2373 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1885.375738][ T2373] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1885.375745][ T2373] Call Trace: [ 1885.375771][ T2373] dump_stack+0x16f/0x1f0 [ 1885.375794][ T2373] should_fail.cold+0xa/0x15 [ 1885.375818][ T2373] ? fault_create_debugfs_attr+0x180/0x180 [ 1885.403841][ T2373] ? ___might_sleep+0x131/0x280 [ 1885.408741][ T2373] should_fail_alloc_page+0x50/0x60 [ 1885.413951][ T2373] __alloc_pages_nodemask+0x1a1/0x8e0 [ 1885.419334][ T2373] ? __alloc_pages_slowpath+0x2520/0x2520 [ 1885.425065][ T2373] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1885.431311][ T2373] ? find_next_bit+0x107/0x130 [ 1885.436085][ T2373] ? __cpu_to_node+0x7e/0xa0 [ 1885.440680][ T2373] ? blk_mq_hw_queue_to_node+0xf1/0x140 [ 1885.446233][ T2373] blk_mq_alloc_rqs+0x223/0x7f0 [ 1885.451094][ T2373] ? __kmalloc_node+0x4e/0x70 [ 1885.455786][ T2373] blk_mq_init_sched+0x266/0x766 [ 1885.460742][ T2373] elevator_init_mq+0xcd/0x160 [ 1885.465516][ T2373] blk_mq_init_allocated_queue+0x10e2/0x15b0 [ 1885.471508][ T2373] blk_mq_init_queue+0x62/0xb0 [ 1885.476295][ T2373] loop_add+0x2dd/0x8d0 [ 1885.480460][ T2373] ? idr_find+0x47/0x60 [ 1885.484630][ T2373] loop_control_ioctl+0x165/0x360 [ 1885.489662][ T2373] ? loop_add+0x8d0/0x8d0 [ 1885.494000][ T2373] ? loop_add+0x8d0/0x8d0 [ 1885.498332][ T2373] do_vfs_ioctl+0xdb6/0x13e0 16:03:04 executing program 4: 16:03:04 executing program 0: [ 1885.502941][ T2373] ? ioctl_preallocate+0x210/0x210 [ 1885.508070][ T2373] ? __fget+0x388/0x560 [ 1885.512239][ T2373] ? ksys_dup3+0x3e0/0x3e0 [ 1885.516659][ T2373] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1885.522904][ T2373] ? fput_many+0x12c/0x1a0 [ 1885.527332][ T2373] ? tomoyo_file_ioctl+0x23/0x30 [ 1885.532277][ T2373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1885.538532][ T2373] ? security_file_ioctl+0x8d/0xc0 [ 1885.543691][ T2373] ksys_ioctl+0xab/0xd0 [ 1885.547865][ T2373] __x64_sys_ioctl+0x73/0xb0 16:03:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001500190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1885.552464][ T2373] do_syscall_64+0xfd/0x6a0 [ 1885.556979][ T2373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1885.562882][ T2373] RIP: 0033:0x459829 [ 1885.566799][ T2373] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1885.586591][ T2373] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1885.595014][ T2373] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1885.602987][ T2373] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1885.610965][ T2373] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1885.618947][ T2373] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1885.626946][ T2373] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:04 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) setrlimit(0xc, &(0x7f0000000080)={0x9}) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) setsockopt$bt_l2cap_L2CAP_OPTIONS(r1, 0x6, 0x1, &(0x7f00000000c0)={0x80, 0x8001, 0xfffffffffffffff7, 0x5, 0x7fff, 0x4, 0x38000000000}, 0xc) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000040)=0x4, 0x4) 16:03:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006000e0000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:04 executing program 0: 16:03:04 executing program 5 (fault-call:4 fault-nth:49): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:04 executing program 4: 16:03:04 executing program 0: 16:03:04 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006c00e0000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:04 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000022300190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:04 executing program 4: [ 1886.025903][ T2651] FAULT_INJECTION: forcing a failure. [ 1886.025903][ T2651] name failslab, interval 1, probability 0, space 0, times 0 [ 1886.038768][ T2651] CPU: 1 PID: 2651 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1886.046320][ T2651] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1886.056376][ T2651] Call Trace: [ 1886.059678][ T2651] dump_stack+0x16f/0x1f0 [ 1886.064026][ T2651] should_fail.cold+0xa/0x15 [ 1886.068631][ T2651] ? fault_create_debugfs_attr+0x180/0x180 [ 1886.074465][ T2651] __should_failslab+0x121/0x190 [ 1886.079416][ T2651] should_failslab+0x9/0x14 [ 1886.083942][ T2651] kmem_cache_alloc_node_trace+0x269/0x730 [ 1886.089782][ T2651] __alloc_disk_node+0x70/0x420 [ 1886.094654][ T2651] loop_add+0x3aa/0x8d0 [ 1886.098823][ T2651] ? idr_find+0x47/0x60 [ 1886.103002][ T2651] loop_control_ioctl+0x165/0x360 [ 1886.108033][ T2651] ? loop_add+0x8d0/0x8d0 [ 1886.112379][ T2651] ? loop_add+0x8d0/0x8d0 [ 1886.116724][ T2651] do_vfs_ioctl+0xdb6/0x13e0 [ 1886.121324][ T2651] ? ioctl_preallocate+0x210/0x210 [ 1886.126453][ T2651] ? __fget+0x388/0x560 [ 1886.130630][ T2651] ? ksys_dup3+0x3e0/0x3e0 [ 1886.135061][ T2651] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1886.141402][ T2651] ? fput_many+0x12c/0x1a0 [ 1886.145843][ T2651] ? tomoyo_file_ioctl+0x23/0x30 [ 1886.150791][ T2651] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1886.157039][ T2651] ? security_file_ioctl+0x8d/0xc0 [ 1886.162164][ T2651] ksys_ioctl+0xab/0xd0 [ 1886.166340][ T2651] __x64_sys_ioctl+0x73/0xb0 [ 1886.170947][ T2651] do_syscall_64+0xfd/0x6a0 16:03:04 executing program 0: 16:03:04 executing program 0: 16:03:04 executing program 0: [ 1886.175474][ T2651] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1886.181369][ T2651] RIP: 0033:0x459829 [ 1886.185272][ T2651] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1886.204885][ T2651] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1886.213302][ T2651] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 16:03:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) gettid() r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_INODE(r1, &(0x7f0000000040)={0x28, 0x2, 0x0, {0x2, 0x9, 0x100000000}}, 0x28) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$void(r0, 0xc0045c79) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1886.221275][ T2651] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1886.229336][ T2651] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1886.237308][ T2651] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1886.245280][ T2651] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:05 executing program 5 (fault-call:4 fault-nth:50): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:05 executing program 0: [ 1886.442234][ T2778] FAULT_INJECTION: forcing a failure. [ 1886.442234][ T2778] name failslab, interval 1, probability 0, space 0, times 0 [ 1886.454936][ T2778] CPU: 0 PID: 2778 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1886.462494][ T2778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1886.472560][ T2778] Call Trace: [ 1886.475872][ T2778] dump_stack+0x16f/0x1f0 [ 1886.480217][ T2778] should_fail.cold+0xa/0x15 [ 1886.484830][ T2778] ? fault_create_debugfs_attr+0x180/0x180 [ 1886.490665][ T2778] __should_failslab+0x121/0x190 [ 1886.495800][ T2778] should_failslab+0x9/0x14 [ 1886.500342][ T2778] kmem_cache_alloc_node_trace+0x269/0x730 [ 1886.506178][ T2778] __kmalloc_node+0x3d/0x70 [ 1886.510707][ T2778] disk_expand_part_tbl+0x1ba/0x3e0 [ 1886.515934][ T2778] __alloc_disk_node+0x11f/0x420 [ 1886.520890][ T2778] loop_add+0x3aa/0x8d0 [ 1886.525067][ T2778] ? idr_find+0x47/0x60 [ 1886.529237][ T2778] loop_control_ioctl+0x165/0x360 [ 1886.534312][ T2778] ? loop_add+0x8d0/0x8d0 [ 1886.538659][ T2778] ? loop_add+0x8d0/0x8d0 [ 1886.543000][ T2778] do_vfs_ioctl+0xdb6/0x13e0 [ 1886.547644][ T2778] ? ioctl_preallocate+0x210/0x210 [ 1886.552768][ T2778] ? __fget+0x388/0x560 [ 1886.556952][ T2778] ? ksys_dup3+0x3e0/0x3e0 [ 1886.561379][ T2778] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1886.567631][ T2778] ? fput_many+0x12c/0x1a0 [ 1886.572059][ T2778] ? tomoyo_file_ioctl+0x23/0x30 [ 1886.577012][ T2778] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1886.583267][ T2778] ? security_file_ioctl+0x8d/0xc0 [ 1886.588392][ T2778] ksys_ioctl+0xab/0xd0 [ 1886.592562][ T2778] __x64_sys_ioctl+0x73/0xb0 [ 1886.597162][ T2778] do_syscall_64+0xfd/0x6a0 [ 1886.601680][ T2778] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1886.607586][ T2778] RIP: 0033:0x459829 [ 1886.611506][ T2778] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1886.631122][ T2778] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:03:05 executing program 0: 16:03:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006000f0000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:05 executing program 4: 16:03:05 executing program 0: [ 1886.639550][ T2778] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1886.647534][ T2778] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1886.655511][ T2778] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1886.663488][ T2778] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1886.671484][ T2778] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000004000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:05 executing program 5 (fault-call:4 fault-nth:51): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:05 executing program 4: [ 1886.873320][ T2990] FAULT_INJECTION: forcing a failure. [ 1886.873320][ T2990] name failslab, interval 1, probability 0, space 0, times 0 [ 1886.886482][ T2990] CPU: 0 PID: 2990 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1886.894041][ T2990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1886.904099][ T2990] Call Trace: [ 1886.907407][ T2990] dump_stack+0x16f/0x1f0 [ 1886.911757][ T2990] should_fail.cold+0xa/0x15 [ 1886.916370][ T2990] ? fault_create_debugfs_attr+0x180/0x180 16:03:05 executing program 0: 16:03:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000000), &(0x7f0000000040)=0x8) clone(0xffffff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) [ 1886.922213][ T2990] __should_failslab+0x121/0x190 [ 1886.927166][ T2990] should_failslab+0x9/0x14 [ 1886.931683][ T2990] kmem_cache_alloc_trace+0x2c3/0x770 [ 1886.937081][ T2990] ? part_uevent+0x120/0x120 [ 1886.941687][ T2990] rand_initialize_disk+0x40/0xc0 [ 1886.946724][ T2990] __alloc_disk_node+0x23f/0x420 [ 1886.951678][ T2990] loop_add+0x3aa/0x8d0 [ 1886.955845][ T2990] ? idr_find+0x47/0x60 [ 1886.960022][ T2990] loop_control_ioctl+0x165/0x360 [ 1886.965061][ T2990] ? loop_add+0x8d0/0x8d0 [ 1886.969400][ T2990] ? loop_add+0x8d0/0x8d0 16:03:05 executing program 0: [ 1886.973739][ T2990] do_vfs_ioctl+0xdb6/0x13e0 [ 1886.978345][ T2990] ? ioctl_preallocate+0x210/0x210 [ 1886.983472][ T2990] ? __fget+0x388/0x560 [ 1886.987642][ T2990] ? ksys_dup3+0x3e0/0x3e0 [ 1886.992069][ T2990] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1886.998328][ T2990] ? fput_many+0x12c/0x1a0 [ 1887.002758][ T2990] ? tomoyo_file_ioctl+0x23/0x30 [ 1887.007706][ T2990] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1887.013966][ T2990] ? security_file_ioctl+0x8d/0xc0 [ 1887.019088][ T2990] ksys_ioctl+0xab/0xd0 16:03:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="4800000ec000190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1887.023256][ T2990] __x64_sys_ioctl+0x73/0xb0 [ 1887.027857][ T2990] do_syscall_64+0xfd/0x6a0 [ 1887.032374][ T2990] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1887.038272][ T2990] RIP: 0033:0x459829 [ 1887.042178][ T2990] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1887.061787][ T2990] RSP: 002b:00007fd72c8dac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 16:03:05 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006451e0000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1887.070203][ T2990] RAX: ffffffffffffffda RBX: 00007fd72c8dac90 RCX: 0000000000459829 [ 1887.078176][ T2990] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1887.086152][ T2990] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 1887.094121][ T2990] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8db6d4 [ 1887.102092][ T2990] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 16:03:05 executing program 0: 16:03:06 executing program 4: 16:03:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe006003f0000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:06 executing program 5 (fault-call:4 fault-nth:52): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) 16:03:06 executing program 0: 16:03:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000000f00190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe00600400000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:06 executing program 0: [ 1887.596765][ T3453] FAULT_INJECTION: forcing a failure. [ 1887.596765][ T3453] name failslab, interval 1, probability 0, space 0, times 0 [ 1887.609504][ T3453] CPU: 1 PID: 3453 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1887.617060][ T3453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1887.627120][ T3453] Call Trace: [ 1887.630430][ T3453] dump_stack+0x16f/0x1f0 [ 1887.634773][ T3453] should_fail.cold+0xa/0x15 [ 1887.639381][ T3453] ? fault_create_debugfs_attr+0x180/0x180 16:03:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0xfffffffffffffffd, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 16:03:06 executing program 4: [ 1887.645217][ T3453] __should_failslab+0x121/0x190 [ 1887.650342][ T3453] should_failslab+0x9/0x14 [ 1887.654857][ T3453] __kmalloc_track_caller+0x2ca/0x750 [ 1887.660241][ T3453] ? pointer+0x750/0x750 [ 1887.664500][ T3453] ? __debug_object_init+0x4ad/0x1090 [ 1887.669885][ T3453] ? kvasprintf_const+0x65/0x190 [ 1887.674839][ T3453] kvasprintf+0xc8/0x170 [ 1887.679101][ T3453] ? bust_spinlocks+0xe0/0xe0 [ 1887.683808][ T3453] ? lockdep_init_map+0x1be/0x6d0 [ 1887.688866][ T3453] kvasprintf_const+0x65/0x190 16:03:06 executing program 0: [ 1887.693659][ T3453] kobject_set_name_vargs+0x5b/0x150 [ 1887.699063][ T3453] device_create_groups_vargs+0x1bb/0x270 [ 1887.704813][ T3453] device_create_vargs+0x45/0x60 [ 1887.709782][ T3453] bdi_register_va.part.0+0x38/0x670 [ 1887.715091][ T3453] bdi_register+0x12a/0x140 [ 1887.719610][ T3453] ? bdi_register_va+0x80/0x80 [ 1887.724383][ T3453] ? enable_ptr_key_workfn+0x30/0x30 [ 1887.729689][ T3453] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 1887.735938][ T3453] bdi_register_owner+0x6a/0x110 [ 1887.740892][ T3453] __device_add_disk+0xda3/0x11b0 16:03:06 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000100)="11dca50d5e0bcfe47bf070") r1 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r1, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001200190d09004beafd0d8c560284ed7a80ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) 16:03:06 executing program 0: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f000000c000)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') symlink(&(0x7f00000000c0)='..', &(0x7f0000000100)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) umount2(&(0x7f0000000280)='../file0\x00', 0x2) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) [ 1887.746289][ T3453] ? blk_alloc_devt+0x2b0/0x2b0 [ 1887.751155][ T3453] ? sprintf+0xc0/0x100 [ 1887.755315][ T3453] ? scnprintf+0x140/0x140 [ 1887.759733][ T3453] ? __init_waitqueue_head+0x36/0x90 [ 1887.765099][ T3453] ? pm_runtime_init+0x311/0x3b0 [ 1887.770059][ T3453] device_add_disk+0x2b/0x40 [ 1887.774659][ T3453] loop_add+0x635/0x8d0 [ 1887.778829][ T3453] loop_control_ioctl+0x165/0x360 [ 1887.783865][ T3453] ? loop_add+0x8d0/0x8d0 [ 1887.788206][ T3453] ? loop_add+0x8d0/0x8d0 [ 1887.792542][ T3453] do_vfs_ioctl+0xdb6/0x13e0 16:03:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x400000000000004) writev(r0, &(0x7f0000000280)=[{&(0x7f0000000440)="480000001400190d09004beafd0d8c560284ed7a80ffe0061e450000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed4e00009052946f02", 0x48}], 0x1) [ 1887.797136][ T3453] ? ioctl_preallocate+0x210/0x210 [ 1887.802248][ T3453] ? __fget+0x388/0x560 [ 1887.806414][ T3453] ? ksys_dup3+0x3e0/0x3e0 [ 1887.810847][ T3453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1887.817103][ T3453] ? fput_many+0x12c/0x1a0 [ 1887.821538][ T3453] ? tomoyo_file_ioctl+0x23/0x30 [ 1887.826494][ T3453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1887.832741][ T3453] ? security_file_ioctl+0x8d/0xc0 [ 1887.837861][ T3453] ksys_ioctl+0xab/0xd0 [ 1887.842018][ T3453] __x64_sys_ioctl+0x73/0xb0 [ 1887.846606][ T3453] do_syscall_64+0xfd/0x6a0 [ 1887.851097][ T3453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1887.856969][ T3453] RIP: 0033:0x459829 [ 1887.860843][ T3453] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1887.880547][ T3453] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1887.888980][ T3453] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1887.897051][ T3453] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1887.905026][ T3453] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1887.913037][ T3453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1887.921006][ T3453] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1887.929398][ T3453] ------------[ cut here ]------------ [ 1887.935292][ T3453] WARNING: CPU: 1 PID: 3453 at block/genhd.c:732 __device_add_disk.cold+0x11/0x19e [ 1887.944654][ T3453] Kernel panic - not syncing: panic_on_warn set ... [ 1887.951242][ T3453] CPU: 1 PID: 3453 Comm: syz-executor.5 Not tainted 5.2.0+ #71 [ 1887.958764][ T3453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1887.968808][ T3453] Call Trace: [ 1887.972125][ T3453] dump_stack+0x16f/0x1f0 [ 1887.976458][ T3453] ? disk_clear_events+0x2d0/0x318 [ 1887.981552][ T3453] panic+0x2dc/0x755 [ 1887.985477][ T3453] ? add_taint.cold+0x16/0x16 [ 1887.990156][ T3453] ? __kasan_check_write+0x14/0x20 [ 1887.995264][ T3453] ? __warn.cold+0x5/0x4c [ 1887.999581][ T3453] ? __device_add_disk.cold+0x11/0x19e [ 1888.005031][ T3453] __warn.cold+0x20/0x4c [ 1888.009271][ T3453] ? __device_add_disk.cold+0x11/0x19e [ 1888.014720][ T3453] report_bug+0x263/0x2b0 [ 1888.019042][ T3453] do_error_trap+0x11b/0x200 [ 1888.023623][ T3453] do_invalid_op+0x37/0x50 [ 1888.028052][ T3453] ? __device_add_disk.cold+0x11/0x19e [ 1888.033503][ T3453] invalid_op+0x23/0x30 [ 1888.037658][ T3453] RIP: 0010:__device_add_disk.cold+0x11/0x19e [ 1888.043711][ T3453] Code: 41 bc f0 ff ff ff e8 ff c5 2f fe 48 8b 7d d0 e8 e2 05 7f fe e9 ea 7a ff ff e8 d8 90 45 fe 48 c7 c7 00 96 c4 87 e8 e0 c5 2f fe <0f> 0b e9 7b de ff ff e8 c0 90 45 fe 48 c7 c7 00 96 c4 87 e8 c8 c5 [ 1888.063301][ T3453] RSP: 0018:ffff88805f39faf8 EFLAGS: 00010286 [ 1888.069475][ T3453] RAX: 0000000000000024 RBX: 00000000fffffff4 RCX: 0000000000000000 [ 1888.077446][ T3453] RDX: 0000000000000000 RSI: ffffffff815b9de2 RDI: ffffed100be73f51 [ 1888.085409][ T3453] RBP: ffff88805f39fc10 R08: 0000000000000024 R09: ffffed1015d26079 [ 1888.093369][ T3453] R10: ffffed1015d26078 R11: ffff8880ae9303c7 R12: ffff888065816200 [ 1888.101327][ T3453] R13: ffff888065816290 R14: ffff88805f39fbe8 R15: ffff888065816204 [ 1888.109313][ T3453] ? vprintk_func+0x82/0x11c [ 1888.113890][ T3453] ? __device_add_disk.cold+0x11/0x19e [ 1888.119331][ T3453] ? blk_alloc_devt+0x2b0/0x2b0 [ 1888.124162][ T3453] ? sprintf+0xc0/0x100 [ 1888.128296][ T3453] ? scnprintf+0x140/0x140 [ 1888.132708][ T3453] ? __init_waitqueue_head+0x36/0x90 [ 1888.137991][ T3453] ? pm_runtime_init+0x311/0x3b0 [ 1888.142927][ T3453] device_add_disk+0x2b/0x40 [ 1888.147513][ T3453] loop_add+0x635/0x8d0 [ 1888.151654][ T3453] loop_control_ioctl+0x165/0x360 [ 1888.156656][ T3453] ? loop_add+0x8d0/0x8d0 [ 1888.160969][ T3453] ? loop_add+0x8d0/0x8d0 [ 1888.165291][ T3453] do_vfs_ioctl+0xdb6/0x13e0 [ 1888.169894][ T3453] ? ioctl_preallocate+0x210/0x210 [ 1888.175001][ T3453] ? __fget+0x388/0x560 [ 1888.179140][ T3453] ? ksys_dup3+0x3e0/0x3e0 [ 1888.183548][ T3453] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 1888.189784][ T3453] ? fput_many+0x12c/0x1a0 [ 1888.194186][ T3453] ? tomoyo_file_ioctl+0x23/0x30 [ 1888.199108][ T3453] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1888.205329][ T3453] ? security_file_ioctl+0x8d/0xc0 [ 1888.210426][ T3453] ksys_ioctl+0xab/0xd0 [ 1888.214571][ T3453] __x64_sys_ioctl+0x73/0xb0 [ 1888.219147][ T3453] do_syscall_64+0xfd/0x6a0 [ 1888.223636][ T3453] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1888.229539][ T3453] RIP: 0033:0x459829 [ 1888.233545][ T3453] Code: fd b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 1888.253136][ T3453] RSP: 002b:00007fd72c8b9c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1888.261537][ T3453] RAX: ffffffffffffffda RBX: 00007fd72c8b9c90 RCX: 0000000000459829 [ 1888.269498][ T3453] RDX: 0000000000000000 RSI: 0000000000004c80 RDI: 0000000000000004 [ 1888.277461][ T3453] RBP: 000000000075bfc8 R08: 0000000000000000 R09: 0000000000000000 [ 1888.285439][ T3453] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd72c8ba6d4 [ 1888.293433][ T3453] R13: 00000000004c2f2f R14: 00000000004d63d0 R15: 0000000000000005 [ 1888.302749][ T3453] Kernel Offset: disabled [ 1888.307206][ T3453] Rebooting in 86400 seconds..